CN1276595C - Data transmitting apparatus, radio communication system and radio communication method - Google Patents

Data transmitting apparatus, radio communication system and radio communication method Download PDF

Info

Publication number
CN1276595C
CN1276595C CN01803405.5A CN01803405A CN1276595C CN 1276595 C CN1276595 C CN 1276595C CN 01803405 A CN01803405 A CN 01803405A CN 1276595 C CN1276595 C CN 1276595C
Authority
CN
China
Prior art keywords
signal
radio station
radio
security information
station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN01803405.5A
Other languages
Chinese (zh)
Other versions
CN1394399A (en
Inventor
折桥雅之
村上丰
安倍克明
松冈昭彦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Holdings Corp
Original Assignee
Matsushita Electric Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matsushita Electric Industrial Co Ltd filed Critical Matsushita Electric Industrial Co Ltd
Publication of CN1394399A publication Critical patent/CN1394399A/en
Application granted granted Critical
Publication of CN1276595C publication Critical patent/CN1276595C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/06Synchronising arrangements
    • H04J3/0602Systems characterised by the synchronising information used
    • H04J3/0605Special codes used as synchronising signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/06Synchronising arrangements
    • H04J3/0635Clock or time synchronisation in a network
    • H04J3/0682Clock or time synchronisation in a network by delay compensation, e.g. by compensation of propagation delay or variations thereof, by ranging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Before a secret information is transmitted, a signal transmission and reception is performed between a first radio station on the secret information transmitting side and a second radio station on the secret information receiving side, thereby estimating a radio propagation path environment shared only by the first and second radio stations. Then, the secret information is transmitted from the first radio station to the second radio station with the foregoing radio propagation path environment taken into account.

Description

Data link, radio communications system and radio communication method
Technical field
The present invention relates to transmit to specific radio station data link, radio communications system and the radio communication method of security information by radio link.
Background technology
In recent years, digital radio occupies critical positions in the communications field because its transfer rate and delivery quality improve rapidly.On the other hand, in radio communication, owing to the electric wave space that utilizes as public resource, if from the confidentiality aspect, the existence meeting is received so essential defective by the 3rd.That is, Content of Communication can be received and easy leakage information by the 3rd usually.
Therefore, in radio communication in the past, by security information is encrypted, even and make and transmit data that the 3rd can not know the content of security information by under the 3rd situation about receiving.In various fields, be applied to various fields in the research encryption and with encryption.Be because encryption has such advantage,, also can guarantee certain fail safe even do not change radio communications system.
Yet, in the encryption of information, there is such problem, if know the password that is used to encrypt and the step of encryption, can more easily separate read message.Especially, under the situation that nowadays high-speed computer is popularized,, then can not guarantee safety if do not carry out quite complicated encryption.
Especially, in the encryption of arithmetic, be the information after the decrypt encrypted, the encryption key as the public information of encrypt and decrypt must be arranged.In the time must accepting this encryption key,, can easily from encryption key and encrypted content, easily separate usually and read security information if when being received encryption key by the 3rd.Particularly when transmitting encryption key and enciphered message by radio link as described above, danger is bigger.
Summary of the invention
The objective of the invention is to, make by radio link when specific radio station transmits security information, can high safety ground transmission security information.
The objective of the invention is to reach following content, promptly when transmitting when comprising the transmission data of security information to the 2nd radio station radio from the 1st radio station, before transmitting security information, between the 1st radio station and the 2nd radio station, receive by the transmission of carrying out signal, infer only total radio transmission path circumstances between the 1st radio station and the 2nd radio station, after the radio that research institute infers transmits path circumstances, transmit security information to the 2nd radio station from the 1st radio station.
Description of drawings
Fig. 1 is the block diagram of the radio communications system structure of expression the invention process form 1.
Fig. 2 is the block diagram of structure of the dispatching station of presentation graphs 1.
Fig. 3 is the block diagram of structure of the receiving station of presentation graphs 1.
Fig. 4 is the precedence diagram of communication steps in the radio communications system of expression example 1,3.
Fig. 5 is the figure of delivery status of the signal of communication of expression example 1,3.
Fig. 6 is the block diagram of structure of the burst signal formation portion of expression example 4.
Fig. 7 is the block diagram of the structure of expression demodulation section of example 4 and data flow formation portion.
Fig. 8 is the block diagram of structure of time synchronized/unique word (unique word) extracting circuit of expression example 4.
Fig. 9 A is the signal waveforms of the action of time synchronized/unique word extracting circuit of being used for key diagram 8.
Fig. 9 B is the signal waveforms of the action of time synchronized/unique word extracting circuit of being used for key diagram 8.
Figure 10 is the figure of delivery status of the signal of communication of expression example 4.
Figure 11 is the block diagram of structure of the radio communications system of expression example 5.
Figure 12 is the precedence diagram of communication steps in the radio communications system of expression example 5,6,7.
Figure 13 represents the delivery status of the signal of communication of example 5.
Figure 14 is the delivery status of the communication system of expression example 6,7,9.
Figure 15 is the block diagram of structure of the radio communications system of expression example 8.
Figure 16 is the precedence diagram of communication steps in the radio communications system of expression example 8,9.
Figure 17 is the block diagram of structure of the radio communications system of expression example 9.
Figure 18 is the structure block diagram of the dispatching station of expression Figure 17.
Figure 19 is the structure block diagram of the radio communications system of expression example 10.
Figure 20 is the structure block diagram of the dispatching station of expression Figure 19.
Figure 21 is the block diagram of structure of the transmission environment deduction portion of expression Figure 20.
Figure 22 is the structure block diagram of the emission characteristics control part of expression Figure 20.
Figure 23 is the figure that is used to illustrate plane of polarization and electric field strength, phase difference.
Figure 24 is the precedence diagram of communication steps of the radio communications system of expression example 10,11.
Figure 25 is the figure that is used to illustrate the action of example 10.
Figure 26 A is used to illustrate the position of antenna and the figure of plane of polarization.
Figure 26 B is used to illustrate the position of antenna and the figure of plane of polarization.
Figure 27 is used to illustrate the position of antenna and the figure of plane of polarization.
Figure 28 is the block diagram of structure of the radio communications system of expression example 11.
Figure 29 is the block diagram of structure of the radio communications system of expression example 12.
Figure 30 is the structure block diagram of the dispatching station of expression Figure 29.
Figure 31 is burst signal formation portion, the beamformer of expression Figure 30, the structure block diagram of modulation portion.
Figure 32 is the demodulation section of expression Figure 30 and the structure block diagram of data flow formation portion.
Figure 33 is the precedence diagram of communication steps in the radio communications system of expression example 12.
Figure 34 is the figure that is used to illustrate that electromagnetic space is synthetic.
Figure 35 is the structure block diagram of the radio communications system of other examples of expression.
Figure 36 is the precedence diagram of the communication steps of other examples of expression.
Embodiment
Below, be elaborated for example of the present invention with reference to accompanying drawing.
(example 1)
In Fig. 1, the 100th, represent the radio communications system of the invention process form 1 on the whole.Radio communications system 100 has dispatching station 101 and receiving station 102.Here, so-called dispatching station 101 and receiving station 102 only be meant, with a side that only sends security information be called dispatching station 101, the side that will receive this security information is called receiving station 102, they have the transmission acceptance division separately.
Dispatching station also has the environment deduction 101c of portion of transmission and transmits the environmental adaptation 101d of portion except sending part 101a and acceptance division 101b.Transmit the environment deduction 101c of portion infers transfer path 103 according to received signal transmission environment.Transmit the environmental adaptation 101d of portion according to transmission action by the inferred results control sending part 101a that transmits the environment deduction 101c of portion acquisition.
Receiving station 102 also has time control part 102c except sending part 102a and acceptance division 102b.Time control part 102c is a benchmark with the time of reception of acceptance division 102b, makes in the slow stipulated time of transmission delay, and carries out temporal control for receiving action simultaneously.
Here, the concrete structure of dispatching station 101 as shown in Figure 2, simultaneously the concrete structure of receiving station 102 is as shown in Figure 3.Dispatching station 101 adds compact part 111 with user data D1 input as shown in Figure 2.Again, for adding compact part 111, the encryption key that input is generated by encryption key generating unit 112, the reference clock that also generates by reference clock generating unit 113 simultaneously by 114 inputs of control channel portion.Add compact part 111 and adopt encryption key that user data D1 is encrypted, thus, form enciphered data, and send it to burst signal formation portion 115.
Again, to burst signal formation portion 115 input encryption key and control channel signals.To form the burst signal that portion 115 forms by burst signal and be input to modulation portion 116.Modulation portion 116 is handled for the digital modulation that input signal for example carries out the regulation of TDMA (Time Division Multiple Access, time division multiple access) modulation etc., and the signal after handling is sent to buffer 117.
The transmission signal that buffer 117 will have been stored outputs to radio transmitting portion (sending RF (radio frequency)) 119 continuously according to the timing of the output control signal of importing from time control part 118.Radio transmitting portion 119 implements the radio transmitting processing of digital to analog conversion processing and up-conversion etc. for sending signal, and the signal after will handling is supplied with antenna AN11.
Here, time control part 118 is equivalent to the transmission environmental adaptation 101d of portion of Fig. 1,113 fan-in network fiducial times of reference clock generating unit, from retardation deduction portion 120 input transfer retardations.Here, retardation deduction portion 120 is equivalent to the transmission environment deduction 101c of portion of Fig. 1.
Then, time control part 118 is according to the output time of network fiducial time and propagation delay amount controller buffer 117, so that receiving station 102 predefined network between two stations can receive the security information signal fiducial time.
Dispatching station 101 sent network fiducial time before sending security information, secondly, in the moment of the delivery time of signal in having considered transfer path 103, send the key information that is formed by user data after encrypting and encryption key.
The acceptance division 101b of dispatching station 101 will be input to radio reception portion (receiving RF) 121 by the received signal that antenna AN11 obtains.Radio reception portion 121 for received signal implement that down-conversion and analog to digital conversion handle etc. radio handle, the signal after handling is sent to demodulation section 122.Demodulation section 122 is for example implemented the regulation numeral demodulation process of TDMA demodulation etc. for input signal, and the signal after handling is sent to data flow formation portion 123 and retardation deduction portion 120.
Data flow formation portion 123 implements the opposite processing of processing carried out with above-mentioned burst signal formation portion 115, thus, burst signal is transformed into original data flow.In decryption part 124 input traffics,, adopt encryption key with the decoding of data encrypted stream from encryption key generating unit 112 input encryption keys.
Secondly, describe for the concrete structure of receiving station 102 with reference to Fig. 3.Receiving station 102 is made of sending part 102a and acceptance division 102b and time control part 102c as mentioned above.Sending part 102a adds compact part 130 with user data D2 input.Again, to adding the encryption key that compact part 130 inputs are extracted out by the encryption key extraction unit 131 of acceptance division 102b.Thus, adding compact part 130 adopts the encryption keys shared with sending exhibition 101 that user data D2 is encrypted.
For burst signal formation portion 132, the user data after input is encrypted, also import the synchronizing code that generates by synchronizing code generating unit 133.Pulse train formation portion 132 is transformed into enciphered data and synchronizing code the transmission signal of pulse series shape and sends to modulation portion 134.Modulation portion 134 is for example carried out the digital modulation of the regulation of TDMA modulation etc. for input signal, and the signal after will modulating outputs to buffer 135.
The transmission signal that buffer 135 will be stored outputs to radio transmitting portion (sending RF) 136 continuously in the moment of the output control signal of importing from the time control part 137 of time control part 102c.Place of origin sending part 136 is handled for the radio transmitting that the transmission signal carries out digital to analog conversion processing and up-conversion etc., and the signal after will handling is supplied with antenna AN12.
The acceptance division 102b of receiving station 102 will obtain received signal by antenna AN12 and be input to radio reception portion (receiving RF) 140.Radio reception portion 140 handles for the radio that received signal is implemented down-conversion and analog to digital conversion processing etc., and the signal after will handling outputs to demodulation section 141.Demodulation section 141 is for example implemented the digital demodulation of the regulation of TDMA demodulation etc. and is handled for input signal, and the signal after will handling outputs to data flow formation portion 142.
Data flow formation portion 142 carries out the processing opposite with above-mentioned burst signal formation portion 132, and the signal transformation with pulse series shape becomes original data flow thus.Lsb decoder 143 is in input traffic, and the encryption key that input is extracted out by encryption key extraction unit 131 adopts encryption key with the deciphering of data encrypted stream.
Here, the output of radio reception portion 140 also outputs to reference clock extraction unit 144.Reference clock extraction unit 144 is extracted control channel signals and network fiducial time out from received signal, and they are outputed to time control part 137 and timer 145.Time control part 137 at first makes operate time and control channel signals synchronous.Secondly, time control part 137 is a benchmark with network fiducial time, at the fixed time after the Td to buffer 135 output output control signals, make thus to send out the transmission signal.Therefore, utilize time T d to be adjusted at the processing delay part that receiving station 102 produces.
Thus, in dispatching station 101, from the time of reception of network fiducial time, time of delay Td, synchronizing code, can calculate signal transmission time.
Timer 145 makes that at first action is constantly synchronous with control channel signals.Secondly, timer 145 is used to begin the control signal that demodulation is moved at network moment Tk to demodulation section 141 outputs.So, receiving station 102 synchronously (perhaps do not make in the locking range that is limited to narrow range) on the time network constantly Tk carry out receiving demodulation.
Here, owing to move synchronously in dispatching station 101 sides (that is, so-called network Tk constantly is the synchronous moment), receiving station can carry out normal demodulation process at network moment Tk.
Again, encryption key extraction unit 131 is from data flow formation portion 142 input traffics the time, from timer 145 fan-in network time informations, and make network constantly Tk from data flow, extracting encryption key out.
In fact, dispatching station 101 at first sends the information that comprises the network fiducial time that is formed by control channel portion 114.According to circumstances repeatedly send this information.As a result, can make receiving station 102 carry out the reception action of high-precise synchronization fiducial time with respect to network.
When receiving station 102 obtains response signals, dispatching station 101 is in retardation deduction portion 120, according to this time of reception and the signal transmission time of network deduction fiducial time in transfer path 103.In dispatching station 101, infer precision (for example, error at 1 below the symbol time) in order to improve, can repeatedly receive response signal from receiving station 102.
Again, dispatching station 101 by time control part 118 control delivery times, begins to receive the network Tk and the propagation delay constantly of action according to receiving station, so that just in time arrive receiving station 102 at network moment Tk when sending encryption key.Thus and since encryption key the network of subscribing constantly Tk arrive receiving station 102, so this moment by making its synchronous also restituted signal, can obtain encryption key.After this, the enciphered data that dispatching station 101 adopts encryption key to receive in turn is decrypted, and simultaneously, user data D2 is carried out these data of encrypting and transmitting.
Secondly, the action for radio communications system 100 in this example describes.Radio communications system 100 communicates with step shown in Figure 4.
At first, dispatching station 101 is as the signal (communication 1) that is used to make that receiving station 102 is synchronous, sends to comprise the network control signal of fiducial time (sending 1B).Receiving station 102 is when received communication 1 (trusted 1T), with this moment and network fiducial time of obtaining be benchmark, be set to 3 the receiving terminal fiducial time (being above-mentioned network moment Tk) of communicating by letter time of delay (T1) of next time sending till (2T delivers letters) with behind the certain hour (T2) next.(T1) only passes through time of delay afterwards from trusted 1T in receiving station 102, sends (T delivers letters) response signal (communication 2) to dispatching station 101.
Therefore, dispatching station 101 and receiving station 102 all preserve above-mentioned time of delay of T1 and the information of certain time interval T 2 as total in advance information.
Dispatching station 101 from control signal and the response signal by trusted 2B acquisition by the 1B output of delivering letters, infers transfer path 103 by transmitting the environment deduction 101c of portion in received communication 2 (trusted 2B).Particularly, be arranged on the retardation deduction portion 120 of dispatching station 101 from the time of deliver letters 1B and trusted 2B, the time of delay (T1) of receiving station and the processing delay of the interior generation of each device etc., calculate the signal transmission time in the transfer path 103.
Here, the processing delay in the device of dispatching station 101 and receiving station 102 is almost constant by the structures shape of this device, it can be handled as Given information when then moving in system.The transmission environmental adaptation 101d of portion of dispatching station 101 (being time control part 118) sends (being network moment Tk) the synchronous moment signal (communicating by letter 3) receiving terminal fiducial time of (3B delivers letters) and receiving station 102 according to signal transmission time and processing delay.
In communication 3, comprise and do not wish to leak into receiving station 102 security information (being meant encryption key in this example) in addition.The information of communication 3 only postpones the time behind the signal transmission time that adds transfer path 103 on the processing delay of dispatching station 101, and receives (trusted 3T) by receiving station 102.Receiving station 102 is that benchmark begins trusted 3T and carries out demodulation with receiving terminal fiducial time of setting among the trusted 1T.After this, dispatching station 101 adopts by 3 encryption keys that transmit of communicating by letter with receiving station 102 information is encrypted and deciphered, and communicates the communication of 4 beginnings simultaneously.
Here, elaborate for communication 3 with reference to Fig. 5.In Fig. 5, receiving terminal 1 is meant that dispatching station 101 sends the destination receiving station 102 of security information, and receiving terminal 2 is other-ends.
When making from communicating by letter for 1 to communication time of 3 enough in short-term, translational speed with respect to receiving station's (receiving terminal 1) 102, the transfer rate of electric wave is very fast, even so the position of dispatching station 101 and receiving station 102 relation changes, the environment of transfer path 103, particularly signal transmission time (transfer path postpones 1) can't produce bigger variation.
For example, suppose from communicate by letter 1 to communication 3 need 1 second of cost, receiving station 102 is with 100[km per hour] speed when moving, transfer path postpones 1 the 100[ns that is changed to] about.Therefore, receiving station's (receiving terminal 1) 102 sets by trusted 1T receiving terminal fiducial time 1, roughly synchronous, do not need to carry out the time to adjust with the moment of the trusted 3T that receives by transfer path 103 and by receiving station 102 by the adjusted transmission of the transmission environmental adaptation 101d of portion of dispatching station 101 3B.
Thus, receiving terminal 1 began to receive and demodulation in receiving terminal fiducial time 1, and the signal of communication of the receiving terminal 1 that arrives by demodulate reception successively can restore the communication information.
On the other hand, study the situation that receiving station's (receiving terminal 1) 102 the 3rd (receiving terminal 2) in addition obtains this communication 3 and restore information.At receiving terminal 2, can obtain from communicating by letter 1 to the information of communication 2, but owing to do not comprise in the signal of communication 3 that expression receives and information fiducial time (network is Tk constantly) of demodulation zero hour, so can not restore information.
This, information was used to send the object time of control fiducial time, promptly receiving terminal 1 with trusted 1 be benchmark calculate and dispatching station 101 by communicate by letter 1 and communicate by letter 2 infer transfer paths 103 signal transmission time (transfer path postpones 1) and so that signal arrived in this fiducial time.This fiducial time is different and different along with transfer path environment (being transfer path).As a result, receiving terminal 2 can not be in advance or is known correct transfer path time of delay 2 by instrumentation.
So, receiving terminal 2 can not be known 3 times that send of communication.Therefore, 2 pairs of signals of communication of receiving terminal can not be set correct receiving terminal fiducial time 2.As a result, can not correctly restore the information of communication 3.Thus, communication 3 can be guaranteed the fail safe of height.
According to above-mentioned structure, total identical fiducial time (network fiducial time) between dispatching station 101 and the receiving station 102, simultaneously, infer the signal transmission time between dispatching station 101 and the receiving station 102, dispatching station 101 sends signal in the moment of considering signal transmission time, so that at network moment Tk receiving station 102 picked up signal, receiving station 102 receives the signal that sends and carries out demodulation at network moment Tk, thus, can realize safe radio communications system 100.
(example 2)
The radio communications system of this example is except this point of order that comes the conversion arrangement information according to the form that pre-determines security information, and is identical with the structure of the radio communications system 100 of example 1.Thus, the radio communications system of this example can carry out the higher communication of fail safe.
In fact, the conversion of this information order is arranged and can be formed portion 115 (Fig. 2) by the burst signal of dispatching station 101 and carry out.Like this, the signal restoring after conversion put in order becomes the processing of former state, then can be formed portion 142 (Fig. 3) by the data flow of receiving station 102 and carry out.Here, the rule that makes conversion put in order is the rule of only determining between dispatching station 101 and receiving station 102 in advance.
So, in the radio communications system of this example, total identical fiducial time between dispatching station 101 and receiving station 102, simultaneously, infer the signal transmission time in the transfer path 103, dispatching station 101 sends signal in the moment of considering signal transmission time, receiving station 102 just in time network constantly Tk with the signal demodulation that receives, and, make and arrange the transmission data with format conversion known between the station that only communicates mutually, thus, except effect, can also realize the radio communications system that fail safe is higher with example 1.
Therefore, to be a kind of not necessarily with the formal qualification of determining the information order, also can adopt multiple form, then can further improve fail safe with respect to the 3rd.
(example 3)
This example also has pseudo-symbol is mixed the structure that sends afterwards with security information on the structure foundation of above-mentioned example 1.In fact the processing that pseudo-symbol is mixed with security information forms portion 115,132 (Fig. 2, Fig. 3) by burst signal and carries out.Again, the processing of removing pseudo-symbol from received signal forms portion 123,142 (Fig. 2, Fig. 3) by data flow and carries out.Thus, the radio communications system of this example can further improve fail safe than the radio communications system 100 of example 1.
Referring again to Fig. 4 and Fig. 5 of adopting in the example 1, describe for the action of the radio communications system of this example.
In the radio communications system of this example, communication 3 (Fig. 4) according to predetermined format configuration security information and fake information.Here, make that the form of subscribing is a symbol the 0,2,5, the 9th as shown in Figure 5, pseudo-symbol, other are secret symbols.At this moment, dispatching station sets regular information, sets fake information and send communication 3 (3T delivers letters) in pseudo-symbol in secret symbols.
The information of communication 3 only postpones the time behind the signal transmission time that adds transfer path 103 on the processing delay of dispatching station 101, and receives (trusted 3T) by receiving station 102.Receiving station 102 is that benchmark begins trusted 3T with the receiving terminal fiducial time of being set by trusted 1T (network is Tk constantly).
At receiving terminal 1, because the symbol 0 of receiving terminal 1 signal of communication is the identical moment with receiving terminal fiducial time 1, so, can only extract secret symbols out and carry out demodulation and deciphering by according to described form selection and remove pseudo-symbol.After this, dispatching station 101 is encrypted according to 3 information that transmitted of communicating by letter with receiving station 102, communicates the communication of 4 beginnings simultaneously.
At receiving terminal 2, because the symbol 0 of receiving terminal 2 signals of communication is not the identical moment with receiving terminal reference signal 2, so in demodulation, can not realize synchronously.The result is can not demodulated received signal.
In addition, promptly allow to receiving signal demodulation and decoding can not be obtained regular private data.For example, under the situation of carrying out pulse train communication, can infer synchronization point from the waveform of received power, and as this example, pass through to insert pseudo-symbol, make the 3rd to be difficult to carry out synchronously.Thus, can further guarantee to communicate by letter 3 fail safe.
So,, except the structure of example 1, in security information, sneak into pseudo-symbol, can realize safe communication system more by making according to above-mentioned structure.
(example 4)
In this example,, also sneak into synchronizing sequence and send except in security information, sneaking into the fake information.Thus, more difficult with the security information recovery, relative therewith for the receiving station outside the security information transmission object, the receiving station that sends object as security information then can utilize synchronizing sequence to obtain the good security information of the quality of reception.
In fact, in the radio communications system of this example, the burst signal formation portion 115 of pie graph 2 as shown in Figure 6, simultaneously, constitute demodulation section shown in Figure 3 141 and data flow formation portion 142 as shown in Figure 7, thus, can mix false signal and remove false signal.Again, in this example, for the purpose of simplifying the description, only for enciphered data is described as the situation that security information transmits.
As shown in Figure 6, the user data D3 after the burst signal formation portion 300 of this example will encrypt is input to burst signal generative circuit 301.To import the false signal sequence that generates by false signal output circuit 303 simultaneously by the unique word sequence input pulse string signal output circuit 301 of unique word output circuit 302 outputs again.Burst signal generative circuit 301 becomes the signal of pulse series shape with user data sequence, unique word sequence and false signal sequence transformation, and the signal after the conversion is delivered to scramble circuit 304.
Scramble circuit 304 carries out scramble with the scrambling mode paired pulses string signal that scrambling mode generative circuit 306 generates, and the signal after scramble is handled is delivered to puncture circuit 305.Puncture circuit 305 and scrambling signal is punctured processing with the breakdown mode that generates by breakdown mode generative circuit 307.Thus, the signal D4 after make to puncture handling as shown in Figure 6, in user data, sneaking into false signal and unique word at random and being incomplete state.Then, the signal D4 after this puncture processing is delivered to modulation circuit 116 (Fig. 2).Again, handling as puncturing, not only can be to make to incomplete state, also can insert specific symbol.
Secondly, describe for the structure of from the signal D4 after process scramble and the puncture processing, only extracting the receiving station of user data D3 out with reference to Fig. 7.Demodulator circuit 310 will be input to phase place and gain adjustment circuit (phase place/gain is adjusted) 311 from the received signal D4 of 140 (Fig. 3) of radio reception portion (receiving RF) output after scramble is handled and punctured processing, and it is input to time synchronized and unique word extracting circuit (time synchronized/unique word is extracted out) 312 simultaneously.
Time synchronized/unique word extracting circuit 312 is imported explanation network moment Tk in the above-mentioned example 1 from timer 145, according to the time of this network moment Tk, extract unique word series out from received signal D4.Then, the unique word series of extracting out is delivered to frequency synchronisation circuit 313, deliver to phase place and gain testing circuit (phase place/gain detects) 314 simultaneously.
Frequency synchronisation circuit 313 detects frequency error from the unique word series of extracting out, frequency information is delivered to phase place and gain adjustment circuit (phase place/gain is adjusted) 311.Phase place/gain testing circuit 314 detected phase rotation amount and gain from unique word series, and this testing result outputed to phase place/gain adjustment circuit 311.Therefore, also can be used as the synchronizing signal use of other circuit by Frequency Synchronization 313 detected frequency informations.
Thus, in phase place/gain adjustment circuit 311, adopt according to unique word correct detected the amount of phase rotation of series and gain, can carry out phase place adjustment and gain adjustment, therefore, can correctly proofread and correct the phase place change that comprises when transmitting and the scramble of gain variations and puncture data D4.
The scramble of having adjusted phase place and gain is punctured the data selector 321 that data are delivered to data flow formation portion 320.Data selector 321 is in timer 135 fan-in networks moment Tk, from phase place/gain testing circuit 314 input phase information and signal amplitude information.Then, according to these information, the signal restoring of pulse series shape is become original data flow, landfill utilization simultaneously punctures the slit of handling between the signal that forms.This data flow is delivered to descrambling frequency circuit 322.
Descrambling frequency circuit 322 is from timer 145 fan-in networks constantly Tk the time, from scrambling mode generative circuit 323 input scrambling modes.Scrambling mode generative circuit 323 generates identical scrambling mode with the scrambling mode generative circuit 306 (Fig. 6) of dispatching station.Thus, descrambling frequency circuit 322 can be removed false signal sequence and unique word sequence and only export user data D3 from data flow.
Here, in Fig. 8 express time synchronously/concrete structure of unique word extracting circuit 312.Time synchronized/unique word extracting circuit 312 punctures data D4 input convolution circuit 330 with scramble.Again, the network moment Tk input controller 331 of the device of self clock in the future 145 (Fig. 7).Carry out time control by 331 pairs of convolution circuit of controller 330.Then, be between the certain hour of benchmark with network moment Tk, puncture the data according to the unique word sequence of form acquisition extraction and by the correlation between the unique word sequence of unique word output circuit 332 generations from scramble.Therefore, unique word generative circuit 332 generates and the identical unique word sequence of dispatching station side.Convolution circuit 330 is delivered to thus obtained correlation in the peak value searching circuit 333.
The peak value of peak value searching circuit 333 search correlation in the hunting zone of setting by hunting zone initialization circuit 334.Hunting zone initialization circuit 334 from by the network of controller 331 output constantly Tk be that the hunting zone with certain hour width is set at the center with the moment after stipulated time only.Here, receiving station is because the configuration of known unique word sequence and false signal sequence in advance, thus roughly can know from the Tk delay of the network moment how long the time engrave the data of demodulation unique word sequence.Therefore, in hunting zone initialization circuit 334, the hunting zone that setting is the center with this moment roughly.
The peak value of the correlation in the above-mentioned hunting zone of peak value searching circuit 333 search.The peak value searching result is delivered to unique word select circuit 335.Unique word selects circuit 335 as the peak value corresponding burst of unique word selection with correlation.
Expression utilizes convolution circuit 330 to obtain the relation of correlation and unique word (synchronization character) in Fig. 9.Fig. 9 (A) is the example (in figure A be unique word) of unique word when being 1, for example, transmits the situation of network fiducial time etc.Under these circumstances, peak-peak only occurs one, for example, in the such wide scope of time width T10, can be used to realize the search of time synchronized.That is, the 3rd is other when being subjected to purpose to obtain synchronizing signal to communicate by letter, and existence can be easier to detect the danger of synchronizing signal.
To this,, obtain the relation of correlation integral value and unique word when in Fig. 9 (B), having represented to receive the signal that mixes unique word sequence and false signal sequence by convolution circuit 330 as this example.Here, with respect to unique word sequence offset certain hour ground configuration false signal sequence, moreover, make that the false signal sequence is the burst with unique word sequence height correlation.As the description to Fig. 6, because there are the correlation of height in unique word sequence and false signal sequence, the correlation of convolution circuit 330 outputs is represented high value with unique word sequence and false signal sequence.For example, when having 1 unique word sequence and 4 false signal sequences in scramble impact data, at almost equal level a plurality of peak values (being these 5 of A~E in the drawings) appear in correlation.(A, B, D, E are the peak value that false signal produced) only carries out peak value searching with time width T11 narrow in scheming when the peak value of unique word is C, thus, can detect the unique word that is used to obtain time synchronized.
Promptly, in the receiving station of this example, set in the configuration part, hunting zone 334 network known with this receiving station only constantly Tk be the hunting zone T11 of the narrow time-amplitude at center, thus, can correctly extract the unique word on the basis of detecting as time synchronized, phase place change detection and gain variations out.Therefore, in other receiving stations, because the false signal of existence and unique word height correlation, owing to the difference that does not have with unique word and false signal, can not correctly carry out time synchronized, the correction of phase place change and the correction of gain, more difficult by other receiving stations' acquisition communication.In this example,, enumerated the unique word sequence that constitutes by a plurality of symbols, and also can replace to pilot tone (pilot) signal that constitutes by a symbolic unit as example again.
Secondly, for the action of the radio communications system of this example, be the center with the synchronization action of receiving station's 102 sides, describe with reference to Figure 10.That is since communication 1 and communicate by letter 2 identical with the action in the above-mentioned example 1, omission explanation here.
The transmission environmental adaptation 101d of portion of dispatching station 101 is according to transmitting signal transmission time and the processing delay that the environment deduction 101c of portion is inferred, sending (3B delivers letters) signal (communicating by letter 3) with synchronous moment receiving terminal fiducial time (network is Tk constantly) of receiving station 102.In communication 3, according to predefined form, arrange and send synchronizing sequence, pseudo-synchronizing sequence (though be exactly above-mentioned false signal sequence, and because in this example, compared with false signal with respect to security information, especially as with respect to the false signal of synchronizing sequence performance function, so followingly so call), security information.
The information of communication 3 only postpones the time after adding signal transmission time on the processing delay time of dispatching station 101, and is received the information of (trusted 3T) communication 3 fiducial time by receiving station 102 at receiving terminal.Receiving station 102 is that benchmark begins trusted 3T with receiving terminal fiducial time of being set by trusted 1T, extracts synchronizing sequence (unique word sequence) out according to described form from this received signal.Then, adopt it to make time, frequency, phase place etc. synchronous.After this, from the received signal that among trusted 3T, receives, separate security information, and this information is carried out demodulation and decoding.After this, the communications of 4 beginnings are encrypted and communicated to the information (for example encryption key) that transmits in 3 according to communicating by letter of dispatching station 101 and receiving station 102.
Here, be described in detail for communication 3 with reference to Figure 10.In Figure 10, with symbol 4,8, F as synchronizing sequence, with symbol 3,7, E as pseudo-synchronizing sequence.Again, dispatching station 101 with receiving terminal 1 as the receiving station 102 that sends purpose, with receiving terminal 2 as other-end.
When transmitting the structure of configuration as Figure 10, owing to almost synchronously receive information in receiving terminal 1 and receiving terminal fiducial time 1, can easily distinguish, select synchronizing sequence ( symbol 4,8, F) and pseudo-synchronizing sequence ( symbol 3,7, E) according to predefined form.
In receiving station 102, adopt this synchronizing sequence, make time, frequency, Phase synchronization.Even the signal that receiving terminal 1 receives (receiving terminal 1 signal of communication), then can be proofreaied and correct according to this synchronizing sequence so long as can not cause falsely dropping the error of selecting pseudo-synchronizing sequence with respect to receiving terminal generation error fiducial time 1.Thus, can improve the quality of reception.
Again, during according to synchronizing sequence phase modulation information, owing to also can carry out Phase synchronization, then carry out synchronous detection or be the detection of benchmark with it for synchronous driving 3 the information of communicating by letter, therefore, can realize than in the example 1 explanation the higher-quality communication of communication means.
On the other hand, because receiving terminal 2 can not be known 3 times that send of communication, receiving terminal 2 can not detect correct synchronizing sequence for signal of communication.For example, if for pseudo-synchronizing sequence adopt with synchronizing sequence similar or during same sequence, receiving terminal 2 adopts the pseudo-synchronizing sequence ( symbol 3,7, E) close with receiving terminal fiducial time 2, can obtain synchronously.As a result, can not be correctly to carrying out demodulation and decoding by communication 3 information that send.Thus, communication 3 can be guaranteed the fail safe of height.
So, according to above-mentioned structure, on the structure foundation of example 1, make again synchronizing sequence and pseudo-synchronizing sequence to be blended in the security information at transmitter side, thus, can realize more upper level and improved the radio communications system of the quality of reception of fail safe.
Therefore, in this example, because receiving station 102 with receiving terminal benchmark fiducial time 1, begins the demodulation and the decoding of received signal, even do not preestablish frame format or the like so station 101 takes place, can be symbol 0 before, symbol 9 at random appends later pseudo-symbols.So, because the variable-length of pulse train is difficult to can further improve the confidentiality to the 3rd from the position of the shape deduction synchronizing sequence of signal amplitude.Moreover, if change, then more difficultly from signal shape, infer by the amplitude that punctures the symbol that circuit 305 inserts.
(example 5)
For adopting among Figure 11 of identical symbol with the corresponding part of Fig. 1,500 represent the radio communications system of the invention process form 5 on the whole.Radio communications system 500 has 2 sending parts 502,503, and the radio communications system 100 of structure in addition and above-mentioned example 1 is basic identical.
That is, the dispatching station 501 of radio communications system 500 is made of the transmission environment deduction 101c of portion, the transmission environmental adaptation 101d of portion, the 1st sending part the 502, the 2nd sending part 503, acceptance division 101b.In fact, the 1st sending part the 502, the 2nd sending part 503 not only has sending part 101a as shown in Figure 2 respectively, and, on different positions, dispose 2 antennas and carry out signal processing by a handling part identical with sending part 101a structure.Receiving station 102 is made of sending part 102a, acceptance division 102b, time control part 102c.According to communication steps shown in Figure 12, communicate by the 1st transfer path 504 and the 2nd transfer path 505.
At first, dispatching station 501 exports control and makes from the 1st sending part 502 and simultaneously, to send (delivering letters 10) and to comprise the network control signal of fiducial time (communication 10) through the 1st transfer path 504.Receiving station 102 when receiving (trusted 10T) communication 10, with this time be benchmark, be set to receiving terminal fiducial time 10 of time of delay (10T) of next time sending till (20T delivers letters), certain hour (T20) communication 30 afterwards.Receiving station 102 from trusted 10T only postpone time of delay (T10) afterwards, dispatching station 501 is sent (20T delivers letters) response signals (communication 20).
Therefore, dispatching station 501 and receiving station 102 in advance as total information all preserve above-mentioned time of delay T10 and the information of certain time interval T 20 and following time of delay T11 and the information of certain time interval T 21.
Station 501 taking place when receiving (trusted 20B) communication 20, transmits the environment deduction 101c of portion infers the 1st transfer path 504 from control signal of being sent by the 10B that delivers letters and the response signal that is received by trusted 20B state.Particularly, be arranged on the retardation deduction portion of dispatching station 501, calculate the signal transmission time in the transfer path 504 according to the time of deliver letters 10B and trusted 20B, the time of delay (T10) of receiving station 102, the processing delay of the interior generation of each device etc.Therefore, processing so far is identical with the processing described in the example 1.
Similarly, dispatching station 501 export control so that from sending part 503 through the 2nd transfer path 505, send (11B delivers letters) signal (communication 11) simultaneously.When receiving station 102 receives (trusted 11T) communication 11, with this time be benchmark, be set to next time next time communicating by letter 31 receiving terminal fiducial time 20 behind time of delay (T11) till deliver letters (21T delivers letters), the certain hour (T21).(T11) only passing through time of delay afterwards in receiving station 102 after trusted 20T, dispatching station 501 is sent (21T delivers letters) response signal (communication 21).
Dispatching station 501 according to by sending the signal (communication 11) and the response signal that is received by trusted 21B (communicating by letter 21) that 11B sends, transmits the state that the environment deduction 101c of portion infers the 2nd transfer path 505 in received communication 21 (trusted 21B).Particularly, the retardation deduction portion that is arranged on dispatching station 501 calculates the signal transmission time in the transfer path 505 according to the time of 11B and trusted 21B of delivering letters, the time of delay (T11) in the receiving station 102, processing delay that each is produced in installing etc.
The transmission environmental adaptation 101d of portion of dispatching station 501 is according to the signal transmission time and the processing delay of the 1st transfer path 504, synchronous fiducial time 20 in order to make with the receiving terminal of receiving station 102, export control so that signal (communication 30) from the 1st sending part 502 through the 1st transfer path 504 and send information (30B delivers letters) simultaneously.
Equally, the transmission environmental adaptation 101d of portion of dispatching station 501 is according to the signal transmission time and the processing delay of the 2nd transfer path 505, synchronous fiducial time 20 in order to make with the receiving terminal of receiving station 102, export control so that signal (communication 31) from the 2nd sending part 503 through the 2nd transfer path 505 and send information (31B delivers letters) simultaneously.
Here, in communication 30, communication 31, for example include the security information of encryption key etc.Communication 30 information only postpones to add the time behind the signal transmission time in the 1st transfer path 504 on the processing delay of dispatching station 501, receive (trusted 30T) by receiving station 102.Similarly, communication 31 information also only postpones to add the time behind the signal transmission time in the 2nd transfer path 505 on the processing delay of dispatching station 502, and receives (trusted 31T) by receiving station 102.
Receiving station 102 is a benchmark with each receiving terminal fiducial time 10 of setting among trusted 10T and the trusted 11T, receiving terminal fiducial time 20, beginning trusted 30T, 31T, and the information data that receives carried out demodulation and decoding.After this, dispatching station 501 and receiving station 102 with communicate by letter 30 and the information (encryption key) that transmits in 31 of communicating by letter be that benchmark is encrypted and deciphered, communicate 4 communications that begin simultaneously.
For communication 30, communication 31, illustrate in greater detail with reference to Figure 13.In Figure 13, dispatching station 501 with receiving terminal 1 as the receiving station 102 that sends purpose, with receiving terminal 2 as other-end.
When make from communicate by letter 10, communication 11 to time of communication 30, communication 31 enough in short-term, because the transmission speed with respect to the translational speed electric wave of receiving station's (receiving terminal 1) 102 is very high, so even the position of dispatching station 501 and receiving station 102 relation changes, the environment of transfer path particularly can not produce bigger variation yet in the delay (transfer path delay 10, transfer path postpone 20) of the 1st transfer path 504 and the 2nd transfer path 505.
Therefore, receiving terminal fiducial time 10 that receiving station's (receiving terminal 1) 102 set respectively in trusted 10T, trusted 11T, receiving terminal fiducial time 20 and receiving terminal basic synchronization fiducial times 10,20, adjust so do not need to carry out the time, be meant the adjusted 30B of delivering letters of the transmission environmental adaptation 101d of portion described receiving terminal fiducial time 10,20, the receiving terminal fiducial time the when 31B that delivers letters is received station 201 and receives by each transfer path 504,505 according to dispatching station 501.
Therefore, receiving terminal 1 for communication 30 be be receiving terminal fiducial time 10 benchmark, for communication 31 be with receiving terminal fiducial time 20 be benchmark, the signal of communication of the receiving terminal 1 that arrives by demodulate reception in turn can restore security information thus.
On the other hand, research is not by being that the 3rd (receiving terminal 2) that sends purpose receives this communication 30, communicates by letter 31 and want the situation of the information of restoring.Though receiving terminal 2 can received communication 10, the information of communication 11, communication 20, communication 21, and owing in the signal of communication 30, communication 31, do not comprise receiving terminal fiducial time 10,20 of expression communication beginning, so can not restore security information.
This, information was meant that receiving terminal 1 is with trusted 10T, 11T that benchmark calculates and dispatching station 501 infers the signal transmission time (transfer path postpones 10,20) of the 1st and the 2nd transfer path 504,505 according to communication 10,11,20,21 and in order to make signal arrive the object time that is used to send control in this fiducial time fiducial time.This fiducial time is different along with transfer path environment (being transfer path).As a result, receiving terminal 2 can not be in advance or is known correct transfer path time of delay 10,20 by instrumentation.
Therefore, the signal of communication of the receiving terminal 1 that receiving terminal 1 receives with communicate by letter 30, communication 31 1 reservations that receiving terminal 1 sets that coexist arrive constantly, so receiving terminal 1 can be with the signal of communication recovery of receiving terminal 1.Relative therewith, for receiving the receiving terminal 2 that comes from the signal of dispatching station 501 by the transfer path all different, can not receive the signal of communication of receiving terminal 2 synchronously with the 1st transfer path the 504, the 2nd transfer path 505.
Therefore, receiving terminal 2 can not be in advance or is known correct transfer path time of delay 11, transfer path time of delay 21 by instrumentation.Thus, receiving terminal 2 can not obtain to communicate by letter 30, the time of advent of communication 31.As a result, can not set correct receiving terminal fiducial time 11, receiving terminal fiducial time 21, received communication 30, communication 31 correctly hardly for the signal of communication of receiving terminal 2.
Especially, if with security information be distributed to sending part 502, sending part 503 sends, and then can obtain more significant effect in fail safe.
So, according to above structure, on the structure foundation of example 1, by a plurality of sending parts 502,503 are set at transmitter side, can and form a plurality of transfer paths 504,505, and the time that security information is determined in receiving station 201 by each transfer path 504,505 (receiving terminal fiducial time 10,20) arrives, and thus, can realize the higher radio communications system of fail safe 500.
(example 6)
In this example, proposed the radio communications system behind the following tectonic association, promptly moment of knowing each other of the station that proposes in the example 1 only communicating mutually send the known each other format conversion in station that proposes in structure that the transmission of data receives, the example 2 only to communicate mutually arrange the structure that sends data, in example 3, propose in the communication information, to sneak into the structure of pseudo-symbol, in example 5, propose pass through the structure that a plurality of paths communicate.On the basis of relevant structure, the radio communications system of this example is also different with example 5, receives, synthesizes the signal via 2 transmission paths simultaneously.
Below, describe for the communication means of this example with reference to Figure 12 and Figure 14.
Here, content illustrated main contents from the communication 10 of Figure 12 to communication 21 and the example 5 is identical, promptly, utilization is from 10 communications to communication 21 of communicating by letter, dispatching station 501 and the signal transmission time that receiving station 102 infers in the 1st and the 2nd transfer path 504,505 set synchronous network fiducial time of the action that is used to make between two stations and receiving terminal fiducial time simultaneously.
That is, at first, dispatching station 501 exports control and makes from the 1st sending part 502 and to send (communication 10B) simultaneously and to comprise the network control signal of fiducial time (communication 10) through the 1st transfer path 504.Receiving station 102 when received communication 10 (trusted 10T), with this time be benchmark, be set to next time next time communicating by letter 30 receiving terminal fiducial time 10 behind time of delay (T10) and the certain hour (T20) till deliver letters (20T delivers letters).(T10) only passes through time of delay afterwards from trusted 10T in receiving station 102, sends (20T delivers letters) response signal (communication 20) to dispatching station 501.
Dispatching station 501 according to control signal that is sent by the 10B that delivers letters (communication 11) and the response signal that is received by trusted 20B, transmits the state that the environment deduction 101c of portion infers the 1st transfer path 504 in received communication 20 (trusted 20B).Particularly, the retardation deduction portion that is arranged on dispatching station 501 calculates the signal transmission time in the transfer path 504 according to the processing delay of the time of 10B and trusted 20B of delivering letters, the time of delay (T10) in the receiving station 102, generation in each device etc.
Similarly, dispatching station 501 exports control and makes from the 2nd sending part 503 and to send (11B delivers letters) signal (communication 11) simultaneously through the 2nd transfer path 505.Receiving station 102 when received communication 11 (trusted 11T), with this time be benchmark, be set to next time next time communicating by letter 31 receiving terminal fiducial time 20 behind time of delay (T11) and the certain hour (T21) till deliver letters (21T delivers letters).
The situation of this example is different with above-mentioned example 5, is to be set at the moment identical with receiving terminal fiducial time 10 this receiving terminal fiducial time 20.
(T11) only passing through time of delay afterwards from trusted 20T in receiving station 102, and dispatching station 501 is sent (sending 21T) response signal (communication 21).
Dispatching station 501 according to control signal that is sent by the 11B that delivers letters and the response signal (communicating by letter 21) that is received by trusted 21B, transmits the state that the environment deduction 101c of portion infers the 2nd transfer path 505 in received communication 21 (trusted 21B).Particularly, the retardation deduction portion that is arranged on dispatching station 501 calculates the signal transmission time in the transfer path 505 according to the processing delay of the time of 11B and trusted 21B of delivering letters, the time of delay (T11) in the receiving station 102, generation in each device etc.
The transmission environmental adaptation 101d of portion of dispatching station 501 is according to the signal transmission time and the processing delay of the 1st transfer path 504, synchronous fiducial time 10 in order to make with the receiving terminal of receiving station 102, and export control and send (30B delivers letters) signal (communication 30) simultaneously, so that pass through the 1st transfer path 504 from the 1st sending part 502.
Similarly, the transmission environmental adaptation 101d of portion of dispatching station 501 is according to the signal transmission time and the processing delay of the 2nd transfer path 505, synchronous fiducial time 20 in order to make with the receiving terminal of receiving station 102, and export control and send (31B delivers letters) signal (communication 31) simultaneously, so that pass through the 2nd transfer path 505 from the 2nd sending part 503.
Here, the security information that comprises encryption key for example etc. in communication 30, communication in 31.The information of communication 30 only postpones the time behind the signal transmission time that adds the 1st transfer path 504 on the processing delay of dispatching station 501, is received station 102 and receives (trusted 30T).Similarly, communication 31 information also only postpones to add the time behind the signal transmission time in the 2nd transfer path 505 on processing delay, and is received station 102 and receives (trusted 31T).
Receiving station 102 is that benchmark begins trusted 30T, 31T with receiving terminal fiducial time 10,20.At this moment, be set at the identical moment communication 30, communication 31 receiving terminal fiducial time 10,20, therefore, receive transmission data simultaneously from dispatching station 501 by receiving station 102.
As a result, in receiving station 102, the communication 30 and the 31 generation phase mutual interference of communicating by letter, the result after they synthesize by receiving station's 102 receptions.The communication information of communication 30 here,, communication 31 is to constitute according to predefined form mixed information symbol (security information) and pseudo-symbol.
At first, for the purpose of simplifying the description, suppose that pseudo-symbol all is that power is 0 symbol.Be benchmark the receiving terminal fiducial time 10 with receiving station 102, in all symbols of communication 30, and 31 the interference that can not be subjected to communicating by letter of the symbol in 31 the overlapping moment of pseudo-symbol of only communicating by letter.Otherwise, in communication all symbols of 31,30 the interference that can not be subjected to communicating by letter of the symbol in 30 the overlapping moment of pseudo-symbol of only communicating by letter.
Therefore, if preestablish the form that two kinds of information symbols can not produce the phase mutual interference, then from communicating by letter 30 and 31 signals that can receive the noiseless deterioration that causes both of communicating by letter.Receiving station 102 carries out demodulation and decoding for so synthetic received signal.
Communication 30, communication 31 for this example more specifically describe with reference to Figure 14.In Figure 14, setting symbol 0,3,6,7,9 and symbol B, C, E, F, I is pseudo-symbol.Again, as the receiving station 102 that sends purpose, receiving terminal 2 is as other-end with receiving terminal 1 in dispatching station 501.
Here, it is roughly synchronous that receiving station's (receiving terminal 1) 102 makes that the receiving terminal fiducial time 10 set among trusted 10T, the trusted 11T and the transmission environmental adaptation 101d of portion according to dispatching station 501 carry out the moment that the adjusted 30B of delivering letters, the 31B that delivers letters constantly receive by each transfer path 504,505 and by receiving station 102, and, because received communication 30, communication 31 simultaneously, each will produce interference the signal of communication of receiving terminal 1.
In Figure 14, symbol 1,2,4,5,8 synthesizes with symbol B, C, E, F, I respectively, and symbol A, D, G, H, J and symbol 0,3,6,7,9 are synthetic.And symbol 0,3,6,7,9 and symbol B, C, E, F, I are pseudo-symbol, and its power is 0, and therefore, the signal of communication of the receiving terminal 1 after synthesizing is A, 1,2, D, 4,5, G, H, 8, J.
Because above-mentioned all information symbols can produce not disturb because of communication each other, the signal of communication of the receiving terminal 1 that arrives by demodulate reception successively can obtain the communication information (security information).
On the other hand, study the situation that the 3rd (receiving terminal 2) of working as non-transmission purpose obtains this communication 30, communication 31 and want the information of restoring.Though receiving terminal 2 can received communication 10, communication 11, communication 20, communication 21 and since be controlled make the identical moment by receiving terminal 1 received communication 30, communication 31, on receiving terminal 2 in that the different moment receive above-mentioned communication respectively.Therefore, because receiving terminal 2 can not be known receiving terminal fiducial time 10 of expression communication beginning, therefore, information symbol can produce interference each other, then can not restore security information.
This, information was that receiving terminal 1 is that benchmark calculates with trusted 10T, 11T and is that dispatching station 501 infers the signal transmission time (transfer path postpones 10,20) of the 1st and the 2nd transfer path 504,505 and sends control so that the object time that signal arrived in this fiducial time according to communication 10,11,20,21 fiducial time.This fiducial time is different because of institute's transfer path environment (being transfer path).As a result, receiving terminal 2 can not be known in advance by instrumentation and knows correct transfer path time of delay 10.
Therefore, the signal of communication of the receiving terminal 1 that receiving terminal 1 receives with communicate by letter 30, communication 31 all arrives constantly in the reservation of being set by receiving terminal 1, so receiving terminal 1 can restore the signal of communication of receiving terminal 1.Relative therewith, for the receiving terminal 2 that receives by the transfer path different from the signal of dispatching station 501, can not receive the signal of communication of receiving terminal 2 synchronously with the 1st transfer path the 504, the 2nd transfer path 505.
Therefore, receiving terminal 2 can not be known in advance by instrumentation and knows correct transfer path time of delay 11, transfer path time of delay 22.Thus, receiving terminal 2 can not be known the time of advent of communication 30, communication 31.As a result, can not set correct receiving terminal fiducial time 11, correctly received communication 30, communication 31 hardly for the signal of communication of receiving terminal 2.
In the communication means of this example, just in case can measure correct transfer path time of delay 11,, can not restore security information even can set correct receiving terminal fiducial time 11 for communication 30 by receiving terminal 2 (the 3rd) again.This is because for the receiving terminal 2 that is positioned at receiving terminal 1 diverse location, communication 31 arrives receiving terminal 2 in the moment different with receiving terminal fiducial time 11.As a result, during reception communication 30 signal with communicate by letter 31 signal generation interference, it is bad that signal can become.
In this example, will communicate by letter 30 31 is prerequisite to arrive receiving station simultaneously with communicating by letter, when the signal front end of communication 30 is consistent with the front end of 31 the signal of communicating by letter, with signal code each other can be not overlapping form, configuration information symbol and pseudo-symbol.As a result, for received communication 30 simultaneously with communicate by letter 31 receiving station, intersymbol can produce interference, causes Signal Degrade.
Particularly, in the signal of communication of the receiving terminal 2 in Figure 14, communication 30 and communicate by letter 31 information symbol 2 and A, 5 with D, 8 and mutual generation interference such as G.As a result, because the phase mutual interference of symbol, signal can produce deterioration, then can not restore information symbol.
So, according to above-mentioned structure, the delivery time of 2 sending parts 502,503 of control dispatching station 501, so that receive 2 each and every one signals simultaneously by receiving station 102, simultaneously, for the information symbol (security information) of 2 signals that do not receive simultaneously, send signal to produce the format permutation of deterioration because of the phase mutual interference and to send 2, thus, the receiving station for beyond receiving station 102 places that send object as security information can not restore security information.As a result, can realize the more radio communications system of upper level of fail safe.
(example 7)
In this example, on the basis of example 6, also have and in security information, sneak into the structure that the synchronizing sequence data send.As these synchronizing sequence data, unique word illustrated in the example 1 etc. is for example arranged.Thus, in this example, except effect, can also improve the quality of reception that sends receiving station's side of object as security information with example 6.
Describe for this example with reference to Figure 11, Figure 12 and Figure 14.By communication 30, communication 31 data of sending is not wish to leak into the private data that sends the receiving station beyond the receiving station 102 of object as security information, at textural according to the rules format configuration information symbol, pseudo-symbol and synchronizing sequence symbol in advance.
The information of communication 30 only postpones the time behind the signal transmission time that adds the 1st transfer path 504 on the processing delay of dispatching station 501, and receives (trusted 30T) by receiving station 102 fiducial time 10 at receiving terminal.Equally, the information of communication 31 only postpones the time behind the signal transmission time that adds the 2nd transfer path 505 on the processing delay of dispatching station 501, and is received by receiving station 102 fiducial time 10 at receiving terminal.Receiving station 102 is that benchmark begins trusted 30T with receiving terminal fiducial time 10.
At this moment, because will communicate by letter 30, be set at the identical moment receiving terminal fiducial time of communication 31 10, in receiving station's 102 communications 30 and communicate by letter and 31 be the while trusted.Therefore, spatially both synthetic backs are received by receiving station 102.
The data of communication 30 on the other hand,, communication 31 are the structure according to predefined format configuration information symbol, pseudo-symbol and synchronizing sequence.Here for the purpose of simplifying the description, suppose that pseudo-symbol all is that power is 0 symbol.Be benchmark the receiving terminal fiducial time 10 with receiving station 102, in all symbols of communication 30, and 31 the interference that is not subjected to communicating by letter of the symbol in 31 the overlapping moment of pseudo-symbol of only communicating by letter.Otherwise, in communication all symbols of 31, do not communicated by letter 30 the interference of the symbol in 30 the overlapping moment of pseudo-symbol of only communicating by letter.
So, suppose in advance by 2 signals of dispatching station 501 in identical moment received communication 30, communication 31, set both simultaneously for not producing the form of phase mutual interference, in identical moment received communication 30 and 31 the receiving station 102 of communicating by letter, can receive the signal that can not cause deterioration because of the interference of two signals.
When receiving such signal, receiving station 102 at first adopts the synchronizing sequence of communication 30, makes time, frequency, phase place etc. synchronous for the symbol of communication 30, and communicate by letter 30 information symbol of demodulation.Similarly, receiving station 102 adopts the synchronizing sequence of communication 31, makes time, frequency, phase place etc. synchronous for the symbol of communication 31, and the information symbol of demodulation communication 31.
Secondly, 2 information symbols after the synthetic demodulation respectively and decoding.After this, dispatching station 501 and receiving station 102 encrypts and deciphers according to by communicate by letter 30 and 31 information (for example encryption key) that transmit of communicating by letter, and communicates 4 communications that begin simultaneously.
For the communication in this example 30, communication 31, further write up with reference to Figure 14.In Figure 14, with symbol 0,3,6,7,9 and symbol B, C, E, F, I as pseudo-symbol, with symbol 1,8 and symbol A, G as synchronizing sequence, with symbol 2,4,5, D, H, J as information symbol.
Here, receiving station's (receiving terminal 1) 102 makes receiving terminal fiducial time 10 of being set by trusted 10T, trusted 11T, roughly synchronous with the moment of the trusted 30T, the 31T that are received by each transfer path 504,505 and by receiving station 102 by the adjusted 30B of delivering letters of the transmission environmental adaptation 101d of portion of dispatching station 501, the 31B that delivers letters.As a result, because in identical moment received communication 30, communication 31, so can not produce interference separately at the signal of communication of receiving terminal 1.
In Figure 14, according to described form, symbol 1,2,4,5,8 and each symbol B, C, E, F, I synthesize, symbol A, D, G, H, J and symbol 0,3,6,7,9 are synthetic, and symbol 0,3,6,7,9 and symbol B, C, E, F, I are pseudo-symbols, because their power is 0, the signal of communication of the receiving terminal 1 after synthesizing is A, 1,2, D, 4,5, G, H, 8, J.
So, owing to all information symbols can not produce interference because of mutual communicating by letter with synchronizing sequence, therefore, and the signal of communication of the receiving terminal 1 that arrives by demodulate reception successively, the communication information that can comprise security information is restored.
So, according to above-mentioned structure, textural at example 6 sneaked into the synchronizing sequence data by making in comprising the transmission data of security information, except the effect of example 6, can be implemented in receiving station's 102 side joints and receive the radio communications system that quality further improves.
(example 8)
In Figure 15, the 800th, represent the radio communications system of the invention process form 8 on the whole.Radio communications system 800 has the 1st and the 2nd dispatching station 801,802, and each dispatching station 801,802 is connected with network 805 by network connecting portion 803,804.Again, the 1st dispatching station 801 communicates with receiving station 102 by the 1st transfer path 806, and simultaneously, the 2nd dispatching station 802 communicates with receiving station 102 by the 2nd transfer path 807.
Here, the 1st and the 2nd dispatching station 801,802 structure separately is except having network connecting portion 803,804 this point, and is basic identical with the structure of the dispatching station 101 of explanation in the example 1.Again, receiving station 102 except with the 1st dispatching station 801, also communicate with the 2nd dispatching station 802, the structure of receiving station 102 of explanation is basic identical in structure in addition and the example 1.
Moreover, the the 1st and the 2nd dispatching station 801,802 comprises the transmission data of security information in the moment transmission of being set by receiving station that will arrive fiducial time at receiving terminal, as as described in implementing form 6, send constantly so that both transmission data arrive at same receiving terminal fiducial time simultaneously certain.
Promptly, the radio communications system of describing in the radio communications system 800 of this example and the example 6 is compared, its difference is, the radio communications system of example 6 is to stand from same transmission by different transfer paths information to be sent to receiving station 102, relative therewith, radio communications system 800 is by different transfer path 806,807 information to be sent to receiving station 102 from different dispatching station 801,802.
Here, the communication 800 of radio communications system is to carry out by the 1st transfer path 806 and the 2nd transfer path 807 and with communication steps shown in Figure 16.
The 1st dispatching station 801 export control so that from sending part 101a through the 1st transfer path 806, send (10B delivers letters) simultaneously and comprise the network control signal of fiducial time (communication 10).Receiving station 102 sets the time of delay (T10) by the regulation of time control part 102c control when obtaining communication 10 (trusted 10T).(T10) only passes through time of delay afterwards from trusted 10T in receiving station 102, and the 1st dispatching station 801 is sent (20T delivers letters) response signal (communication 20).
Therefore, dispatching station 801 and receiving station 102 all preserve above-mentioned time of delay of T10 as total in advance information.
When the 1st dispatching station 801 receives (trusted 20B) communication 20, from control signal (communication 10) that sends by the 10B that delivers letters and the response signal that receives by trusted 20B, transmit the state that the environment deduction 101c of portion infers the 1st transfer path 806.Particularly, be arranged on the transmission environment deduction 101c of portion of dispatching station 801 from the time of deliver letters 10B and trusted 20B, the time of delay (T10) of receiving station 102, the processing delay of the interior generation of each device etc., calculate the signal transmission time in the 1st transfer path 806.
Similarly, the 2nd dispatching station 802 export control so that from sending part 102a through the 2nd transfer path 807, send (11B delivers letters) simultaneously and comprise the network control signal of fiducial time (communication 11).Receiving station 102 sets the time of delay (T11) by the regulation of time control part 102c control when obtaining communication 11 (trusted 11T).(T11) only passes through time of delay afterwards from trusted 11T in receiving station 102, and the 2nd dispatching station 802 is sent (21T delivers letters) response signal (communication 21).
Therefore, dispatching station 802 and receiving station 102 all preserve above-mentioned time of delay of T11 as total in advance information.
When the 2nd dispatching station 802 receives (trusted 21B) communication 21,, transmit the state that the environment deduction 101c of portion infers the 2nd transfer path 807 from by deliver letters 11 control signals that send (communication 11) and the response signal that receives by trusted 21B.Particularly, be arranged on the transmission environment deduction 101c of portion of dispatching station 802 from the time of deliver letters 11B and trusted 21B, the time of delay (T11) of receiving station 102, the processing delay of the interior generation of each device etc., calculate the signal transmission time in the 2nd transfer path 807.
As mentioned above, behind the signal transmission time of finishing between signal transmission time, the 2nd dispatching station 802 and the receiving station 102 that infers between the 1st dispatching station 801 and the receiving station 102, then, receiving station 102 adopts time control part 102c to set receiving terminal reference signal 10 afterwards at certain hour (T20), sends (30T delivers letters) benchmark notification signal (communication 30) constantly for the 1st dispatching station 801 and the 2nd dispatching station 802 simultaneously.
The 1st dispatching station 801 obtains to send to the security information of receiving station 102 by network connecting portion 803 from network 805.Similarly, the 2nd dispatching station 802 obtains to send to the security information of receiving station 102 by network connecting portion 804 from network 805.
When the 1st dispatching station 801 received communications 30 (trusted 30B), the transmission environmental adaptation 101d of portion of the 1st dispatching station 801 is according to the moment of signal transmission time and the processing delay and the trusted 30B of the 1st transfer path 806, the delivery time of control communication 40 is so that arrive in receiving terminal fiducial times 10 of receiving station 102.Then, the 1st dispatching station 801 sends (40B delivers letters) so that signal (communication 40) from sending part 101a through the 1st transfer path 806.
Similarly, when the 2nd dispatching station 802 received communications 30 (trusted 31B), the transmission environmental adaptation 101d of portion of the 2nd dispatching station 802 is according to the moment of signal transmission time and the processing delay and the trusted 31B of the 2nd transfer path 807, the delivery time of control communication 40 is so that arrive in receiving terminal fiducial times 10 of receiving station 102.Then, the 2nd dispatching station 802 sends (41B delivers letters) so that signal (communication 41) from sending part 101a through the 2nd transfer path 807.
Communication 40 information only postpones the time behind the signal transmission time that adds the 1st transfer path 806 on the processing delay of the 1st dispatching station 801 and receives (trusted 40T) by receiving station 102 fiducial time 10 at receiving terminal.Similarly, communication 41 information only postpones the time behind the signal transmission time that adds the 2nd transfer path 807 on the processing delay of the 2nd dispatching station 802 and is received by receiving station 102 fiducial time 10 at receiving terminal.Receiving station 102 is that benchmark begins trusted 40T with receiving terminal fiducial time 10.
At this moment, because will communicate by letter 40, be set at the identical moment receiving terminal fiducial time of communication 41 10, so at receiving station's 102 while received communication 40 and communicate by letter 41.That is the result after, both synthesize by receiving station's 102 receptions.
Here, with the transmission data of example 7 in the same manner, synchronization receive by communicate by letter 40 and communicate by letter 41 send data the time, arrangement information symbol, pseudo-symbol and synchronizing sequence symbol be not so that information symbol can produce interference each other.Thus, with example 7 in the same manner, only can carry out demodulation and decoding for communication 40, communication 41 content by receiving station 102.Therefore, if set the first half of communication 40 and be pseudo-symbol, similarly, when the latter half of setting communication 41 is pseudo-symbol (perhaps set make the due in of communication 40, communication 41 on have constant interval), receiving station 102 can receive the information from the 1st and the 2nd receiving station 801,802 continuously.
So, according to above-mentioned structure, security information is divided into a plurality of block of informations, security information after the safe communication line of employing special circuit etc. will be cut apart is distributed to a plurality of dispatching stations, and the security information after will distributing sends to receiving station, thus, can realize the radio communications system 800 of the transmission security information that fail safe is higher.
(example 9)
For adopting among Figure 17 of prosign with the corresponding part of Fig. 1,900 represent the radio communications system of the invention process form 9 on the whole.Radio communications system 900 has the 1st and the 2nd transmission acceptance division 902,903 that is formed by sending part 101a that describes among Fig. 1 and acceptance division 101b respectively.Then, the 1st sends acceptance division 902 communicates with receiving station 102 by the 1st transfer path 906, and simultaneously, the 2nd acceptance division 903 communicates with receiving station 102 by the 2nd transfer path 907.
Here, the communication operation of dispatching station 901 and receiving station 102 as described as follows, dispatching station 901 infers the received power that receives by the 1st and the 2nd transfer path 906,907, the power that obtains according to deduction is controlled transmitted power and is sent signals to receiving station 102 simultaneously, and structure in addition is identical with the radio communications system 500 that example 5 is described with reference to Figure 11.
Here, the detailed construction of representing the dispatching station 901 of this example at Figure 18.In Figure 18, for adopting identical symbol with the corresponding part of Fig. 2.Under the situation of this example, constitute the environment deduction portion 904 that transmits by retardation deduction 904a of portion and the 904b of power measurement portion.Constitute the environmental adaptation portion 905 that transmits by time control part 905a and the 905b of power measurement portion again.
Then, to be input to the retardation deduction 904a of portion by the 1st known signal that sends for example unique word that acceptance division 902 demodulation sections 122 extract out etc., simultaneously, will be input to the retardation deduction 904a of portion by the 2nd known signal that sends unique word that acceptance division 903 demodulation sections (not shown) extract out etc.The retardation deduction 904a of portion infers signal transmission time constantly with the known signal from network as described in implementing form 1.Under the situation of this example, infer the 1st and the 2nd transfer path 906,907 signal transmission time separately.
Then, time control part 905a considers the output time of being adjusted buffer 117 by the signal transmission time of the 1st transfer path 906 of the retardation deduction 904a of portion acquisition, so that constantly arrive receiving station 102 by the 1st transfer path 906 at the network of subscribing from the 1st signal that sends acceptance division 902.
Similarly, time control part 905a considers the output time of being adjusted buffer (not shown) by the signal transmission time of the 2nd transfer path 907 of the retardation deduction 904a of portion acquisition, so that constantly arrive receiving station 102 by the 2nd transfer path 907 at the network of subscribing from the 2nd signal that sends acceptance division 903.
The 904b of power measurement portion that transmits environment deduction portion 904 import the 1st send acceptance division 902 radio reception portion (trusted RF) 121 output and measure the power that sends the received signal that acceptance division 902 receives by the 1st.Similarly, the 904b of power measurement portion import the 2nd send acceptance division 903 radio reception portion (not shown) output and measure the power that sends the received signal that acceptance division 903 receives by the 2nd.
Transmit the more predefined performance number of power control section 905b and the received power measurement result that obtains by the 904b of power measurement portion of environmental adaptation portion 905, and control the transmitted power of the 1st and the 2nd transmission receiving station 902,903 according to this comparative result.Particularly, when sending received power that acceptance division 902,903 receives less than setting, by the radio transmitting portion (RF delivers letters) 119 that controls each sending part 101a, so that transmitted power increases by the 1st or the 2nd.Relative therewith, when sending received power that acceptance division 902,903 receives greater than setting, by the radio transmitting portion (RF delivers letters) 119 that controls each sending part 101a, so that transmitted power reduces by the 1st or the 2nd.
Thus, in radio communications system 900, only the receiving station 102 as security information transmission object can send acceptance division 902 and the suitableeest received signal of the 2nd transmission acceptance division 903 reception incoming levels from the 1st of dispatching station 901.
As a result, in receiving station 102, incoming level and transfer path 906,906 adapt most, and can obtain the synthetic result at 2 signals of the moment arrival synchronous with receiving action.Thus, in receiving station 102, demodulation security information reliably.
Relative therewith, for the 3rd,, be used for the suitable incoming level of this signal of demodulation and the suitable time of reception so be difficult to acquisition owing on the position different, receive information from dispatching station 901 with receiving station 102, therefore, be difficult to carry out to received signal demodulation.
Secondly, with reference to Figure 14 and Figure 16, describe for the action of radio communications system 900.
At first, dispatching station 901 export control so that from the 1st sending part 902 through the 1st transfer path 906, and send (10B delivers letters) simultaneously and comprise the network signal of fiducial time (communication 10).When receiving station 102 receives (trusted 10T) to communication 10, set the time of delay (T10) of the regulation of controlling by time control part 102c.(T10) only passing through time of delay afterwards from trusted 10T in receiving station 102, sends (20T delivers letters) response signal (communication 20) with the power of subscribing to dispatching station 901.Therefore, dispatching station 901 and receiving station 102 all preserve above-mentioned time of delay of T10 as total information in advance.
When dispatching station 901 received (trusted 20B) communication 20, environment deduction portion 904 inferred state with deduction the 1st transfer path 906 signal (communication 10) and the response signal (communicating by letter 20) that is received by reception 20B from the transfer path that is sent by the 10B that delivers letters.Particularly, infer signal transmission time and power attenuation amount in the 1st transfer path 906.Measure the power of trusted 20B and infer power attenuation amount in the transfer path 906 according to this value and the difference of the power output of predetermined response to signal (communicating by letter 20).
Similarly, dispatching station 901 export control so that from the 2nd sending part 903 through the 2nd transfer path 907, and send (11B delivers letters) simultaneously and comprise the network signal of fiducial time (communication 11).When receiving station 102 receives (trusted 11T) to communication 11, set the time of delay (T11) of the regulation of controlling by time control part 102c.(T11) only passing through time of delay afterwards from trusted 11T in receiving station 102, sends (21T delivers letters) response signal (communication 21) with predetermined electric power to dispatching station 901.Therefore, dispatching station 901 and receiving station 102 all preserve above-mentioned time of delay of T11 as total information in advance.
When dispatching station 901 received (trusted 21B) communication 21, environment deduction portion 904 inferred state with deduction the 2nd transfer path 907 signal (communication 11) and the response signal (communicating by letter 21) that is received by reception 21B from the transfer path that is sent by the 11B that delivers letters.Particularly, infer signal transmission time and power attenuation amount in the 2nd transfer path 907.Measure the power of trusted 21B and infer power attenuation amount in the transfer path 907 according to this value and the difference of the power output of subscription response signal (communicating by letter 21).
So, dispatching station 901 infers signal transmission time and signal power attenuation in the 1st and the 2nd transfer path 906,907 according to communication 30, communication 31.
Receiving station 102 adopts time control part 102c to set receiving terminal reference signal 10 in certain hour (T20) back, sends (30T delivers letters) benchmark notification signal (communication 30) constantly to dispatching station 901 simultaneously.
Secondly, dispatching station 901 sends acceptance division 902 by communication 40 from the 1st and sends the signal that (40T delivers letters) comprises security information, simultaneously, sends acceptance division 903 from the 2nd and sends the signal that (41B delivers letters) comprises security information by communication 41.At this moment, dispatching station 901 control is delivered letters constantly, so that 2 signals arrive in receiving terminal fiducial times 10 of being set by receiving station 102 simultaneously, simultaneously, receiving station's 102 controls power of delivering letters is so that can receive 2 signals with optimal power.
Receiving station 102 is that benchmark begins trusted 40T with receiving terminal fiducial time 10.At this moment, because will communicate by letter 40, be set at the identical moment receiving terminal fiducial time of communication 41 10, so at receiving station's 102 while received communication 40 and communicate by letter 41.That is the result after, both synthesize by receiving station's 102 receptions.
In this example, make in communication 40, communication 41, to send same information.Thus, in receiving station 102, can obtain the effect of path diversity.Again, under this example, dispatching station 901 sends communication 40, communication 41 with low-down power.Thus, for 2 signals each other, the receiving station 102 that can synthesize both same-sign and receive can obtain to be used for the enough big signal level of demodulation, relative therewith, for be positioned at receiving station 102 diverse locations on other receiving stations, can not be from communicating by letter 40, obtaining the necessary signal level of demodulation the communication 41.
So, according to above-mentioned structure, by a plurality of transmission acceptance divisions 902 are set in dispatching station 901,903, can between dispatching station 901 and receiving station 102, form a plurality of transfer paths 906,907, deduction is at each transfer path 906, power attenuation amount when communicating in 907, when receiving station 102 synthesizes by a plurality of transfer paths 906,907 and each received signal of arriving and when receiving, by with transmitted power under can the minimum level of demodulation from above-mentioned a plurality of transmission acceptance divisions 902,903 send security information, thus, for other receiving stations that are positioned at outside the receiving station 102, be difficult to this security information of demodulation.As a result, can realize the radio communications system 900 that fail safe further improves.
(example 10)
In Figure 19,1000 represent the radio communications system of the invention process form 10 on the whole.The dispatching station 1001 of radio communications system 1000 has by the antenna AN20 of 2 vertical on plane of polarization linearly polarized waves, the antenna part 1003 that AN21 constitutes.Again, the antenna part 1004 of receiving station 1002 has the antenna AN30 of a linearly polarized wave.
Thus, in radio communications system 1000, with the plane of polarization of the antenna AN30 of receiving station 1002 as the total transfer path environment of dispatching station 1001 only and receiving station 1002, on the basis of considering this transfer path environment, make security information is sent to receiving station 1002 from dispatching station 1001.
That is, at first, according to the transmission ripple that sends from receiving station 1002, the transmission environment deduction portion 1006 of dispatching station 1001 infers the plane of polarization of the antenna AN30 of receiving station 1002.Secondly, according to by transmitting the inferred results that environment deduction portion 1006 obtains, the emission characteristics control part 1008 control antenna portions 1003 of dispatching station 1001 are so that form the emission characteristics that receiving station 1002 only can receive.
Again, in the dispatching station 1001 and receiving station 1002 of radio communications system 1000, time control part 1007,1010 is set, utilize this time control part 1007,1010, with example 1 similarly, make the delivery time of the signal transmission time in considering the transfer path 1011 that dispatching station only 1001 and receiving station 1002 can have, from dispatching station 1001 to receiving station's 1002 transmission security informations.Thus, only receiving station 1002 can receive security information and restore.
Therefore, the time control part 1007 of Figure 19 is equivalent to the transmission environment deduction 101c of portion of Fig. 1 and transmits the environmental adaptation 101d of portion.Receiving station 1002 is identical with the structure of Fig. 3, so omit explanation here.Here, for the purpose of simplifying the description, antenna AN30 is equivalent to antenna AN12, receives sending part 1009 and is equivalent to sending part 102a and acceptance division 102b, and time control part 1010 is equivalent to time control part 102c.
The concrete structure of dispatching station 1001 as shown in figure 20.In the Figure 20 that represents for giving same-sign with Fig. 2 counterpart, dispatching station 1001 roughly can be divided into by sending part 1012, acceptance division 1013, transmit environment determination part 1006 and time control part 1007 constitutes.Here, the transmission acceptance division 1005 of Figure 19 is equivalent to sending part 1012 and acceptance division 1013.
2 straight line linearly polarized wave antenna AN20, the AN21 that dispatching station 1001 utilizations make plane of polarization vertically be provided with mutually receive the electric wave from receiving station 1002.Then, the output with each antenna is input to radio reception portion (trusted RF) 121.Radio trusted portion 121 handles for the radio that down-conversion, analog to digital conversion etc. are carried out in the output of each antenna, and the signal after handling is delivered to demodulation section 122 and transmitted environment deduction portion 1006.
Transmit the output of environment deduction portion 1006, infer the plane of polarization of the antenna of receiving station 1002, inferred results is delivered to emission characteristics control part 1008 according to 2 antennas after handling through radio communication.Emission characteristics control part 1008 is according to inferred results control radio transmitting portion (RF delivers letters) 119, so that the received power maximum of receiving station 1002.
Such as shown in figure 21, composing environment deduction portion 1006.Constitute emission characteristics control part 1008 as shown in Figure 22 again.
Transmit environment deduction portion 1006 and have electric field strength test section 1020 and phase difference detection portion 1021.Electric field strength test section 1020 detects the output electric field strength of each antenna according to the output of 2 antennas.Again, phase difference detection portion 1021 obtains the phase difference of each antenna output according to the output of 2 antennas.The polarized wave state that polarized wave deduction portion 1022 infers received signal from the electric field strength and the phase difference of 2 antenna outputs.
Generally, when adopting perpendicular 2 antennas (V, H) of plane of polarization, as shown in figure 23, for electromagnetic polarized wave (p among the figure), can obtain the phase difference of the electric field strength (Ev among the figure, Eh) that is projected on the plane of polarization (V among the figure, H) that the emission characteristics by antenna provides and two received signals.For example, p is set at elliptically polarized wave with polarized wave, can adopt electric field strength (Ev, Eh) and phase difference, obtains the angle and the flat ratio (ratio of oval major and minor axis) that are made of its major axis and antenna (V, H).For angle, also can be similar to and obtain from Ev, Eh again.
In the transmission environment deduction portion 1006 of example, utilize foregoing, can infer the polarization state that the information of angle that major axis and antenna by polarized wave p form, flat ratio etc. forms.
Emission characteristics control part 1008 will send signal respectively and the inferred value signal that obtained by polarized wave deduction portion 1002 is input to electric field strength control part 1030 and phase control division 1031 as shown in figure 22.Synthetic portion 1032 generates and the vertical corresponding signal phasor of antenna AN20, AN21 (V vector, H-vector) with phase place according to electric field strength.Then, to output to the antenna AN21 of V direction by radio transmitting portion 119 corresponding to the amplitude of V direction vector, the transmission signal of phase place, simultaneously, will output to H directional aerial AN20 by radio transmitting portion 119 corresponding to the amplitude of H direction vector, the transmission signal of phase place.
Thus, transmit the polarized wave state that environment deduction portion 1020 can obtain according to deduction, control sends the plane of polarization of signal, so that the received power of the antenna part 1004 of receiving station 1002 be maximum, promptly so that the plane of polarization that the major axis of polarized wave p and emission characteristics by antenna determine spool consistent.
Secondly, describe for the action of radio communications system 1000 with reference to Figure 24.Again, dispatching station 1001 is identical with example 1 with the transmission time of reception of 1002 of receiving stations here, so be that emphasis point describes with the plane of polarization of adjusting electric wave.
At first, receiving station 1002 sends (1T delivers letters) polarized wave deduction signal (communication 1).Here, the antenna part 1004 of receiving station 1002 is made of the antenna AN30 of the characteristic that has linearly polarized wave as emission characteristics, so the electromagnetic wave that this antenna AN30 sends has certain specific plane of polarization.
This transmission signal is by reflection and refraction in the transfer path 1011, and the plane of polarization rotation is under through the state that postpones, by antenna part 1003 receptions of dispatching station 1001.In the antenna part 1003 of dispatching station 1001, the configuration emission characteristics is antenna AN20, the AN21 of linearly polarized wave, so that plane of polarization is vertical mutually, thus do not rely on the plane of polarization of received signal, and can stably receive.
Dispatching station 1001 is when being received (trusted 1B) communication 1 by antenna part 1003, the environment deduction 1006a of portion is by carrying out the polarized wave state that calculation process is inferred received signal to receiving each received signal by 2 antenna AN20, AN21.
Secondly, emission characteristics control part 1008 is according to transmitting the polarized wave state that environment deduction portion 1006 infers, control sends the plane of polarization and transmission (2B delivers letters) communication 2 of signal, so that the received power maximum of the antenna part 1004 of receiving station 1002, promptly make the major axis of polarized wave p with consistent by the axle of the plane of polarization of the emission characteristics decision of antenna AN30.Can realize the control of this plane of polarization by the inverse operation of the deduction method when receiving.
So, when control plane of polarization and output transmission signal, in the antenna part 1004 of receiving station 1002, can be with the signal of optimal plane of polarization reception from the communication 2 of dispatching station 1001.Receiving station 1002 receives (trusted 2T) communication 2 by antenna part 1004.Therefore, dispatching station 1001 sends to receiving station 1002 by the 2 transmission data that will comprise security information of communicating by letter.After this radio communications system 100 similarly communicates communicating by letter after 3 between dispatching station 1001 and receiving station 1002.
Here, when dispatching station 1001 and receiving station 1002 communicate in foreseeable environment, owing to can keep the stability of plane of polarization, the communication in can stably carry out this example.On the other hand, have barrier sometimes in both communication paths, in the environment that only can not communicate with ground wave, the polarized wave that is subjected to the ambient conditions influence can confusion reigned.Yet,, the transfer path environment can be seen as stable if make that the moment of inferring the transfer path environment (being plane of polarization in this example) that obtains is enough little with the interval of adopting this actual moment that communicates of transfer path environment.
For example, fixedly dispatching station 1001 and receiving station 1002 both, on both communication paths, exist the situation of the low barrier of translational speed as the people suitable therewith.Again, for example, in the such situation that disposes dispatching station 1001 and dispatching station 1002 is installed on automobile on the road, even between the communication path of dispatching station 1001 and receiving station 1002, do not exist under the situation of barrier, since the variation of situation, polarized wave meeting confusion reigned is then suitable therewith.
Under these circumstances, when even the side in dispatching station 1001, the receiving station 1002 or both are moved, can consider make to infer moment, enough little of transfer path environment, so the transfer path environment can be seen as stable with the interval of adopting this actual moment that communicates of transfer path environment.
Relative therewith, research is by not being the 3rd received communication 1 of communication object and communicating by letter 2 and want the situation of the information of obtaining.At this moment, because the information of the communication of receiving terminal acquisition improperly 2 must make that plane of polarization is suitable.
Dispatching station 1001 and receiving station 1002 be owing to 1 make that the axle of plane of polarization is consistent by communicating by letter, and because to communicate by letter 1 be output signal from receiving station 1002, and then receiving terminal can not be inferred plane of polarization from dispatching station 1001 improperly.That is, can not know the polarized wave state of the communication 2 on the antenna end of receiving station 1002 in advance, so can not obtain by other-end.
As a result, even under the situation of the communication of receiving station's acquisition improperly 1, because according to control of communication 1 terminal plane of polarization and transmission communication 2, so receiving station can not know from the electromagnetic plane of polarization of dispatching station 1001 outputs improperly in advance.
Be elaborated with reference to Figure 25.Communication 1 among the communication 1 of Figure 25, communication 2 and Figure 24, communicate by letter 2 identical.Again, in Figure 25, receiving station's 1040 expressions are not the receiving stations improperly that security information sends object.
Here, dispatching station 1001 and receiving station 1002 communicate 1 and communicate by letter 2 by transfer path 1011.Study that receiving station improperly 1040 receives these communications 1 and 2 the situation of communicating by letter.Between dispatching station 1001 and receiving station 1002, all communicate 1 and communicate by letter 2 by transfer path 1011.Relative therewith, in receiving station 1040, by transfer path 1041 received communications 1, by transfer path 1042 received communications 2.
Transfer path 1042 when transfer path 1041 when so, receiving station 1040 receives communication 1 from receiving station's 1002 outputs and receiving station 1040 receive from the communication 2 of dispatching station 1001 outputs is different with transfer path 1011.The result, even receiving station 1040 is by received communication 1, and can infer and receiving station 1002 between under the situation of the transfer path 1041 that forms, because this transfer path 1041 is different with the transfer path 1042 of formation between dispatching station 1001, so received communication 2 correctly.Therefore, receiving station 1040 can not stably obtain to communicate by letter 1 and communicate by letter in 2 information of any one or both information improperly.
Usually, for adopting electromagnetic radio communications system, between transmitter side and receiver side, must make the polarized wave characteristic unanimity of antenna etc., then can cause the deterioration in characteristics of degradation under the communication quality as correctly not making their unanimities.For example, if the polarized wave characteristic in the emission characteristics of antenna is that dispatching station, receiving station can carry out the adjustment of plane of polarization, so that the plane of polarization of the emission characteristics of antenna is vertical with respect to ground plane under the identical situation with respect to horizontal direction.Make the vertically polarized wave that plane of polarization is vertical with respect to ground situation etc. down, the emission characteristics that can easily set horizontal direction is identical.
On the other hand, when the emission characteristics of antenna is different in the horizontal direction, must between dispatching station, receiving station, adjust plane of polarization.With reference to Figure 26, Figure 27 this is specified.In the radio communications system that electromagnetic wave is propagated on the direction parallel with the face of land, such shown in Figure 26 (A), by vertically dispose the antenna AN of dispensing device and receiving system with respect to ground plane, the emission characteristics of antenna AN can be set at vertically polarized wave.Here, add that ground plane is roughly level, and add that emission characteristics is identical in the horizontal direction.
Secondly, shown in Figure 26 (B), the concrete example when research is configured in horizontal direction with antenna AN.When supposing that antenna among the figure is dipole antenna, emission characteristics and inequality in the horizontal direction, plane of polarization is also along with different with the position relation of apparatus main body 1050.In such structure, be that example is studied with the system that sends electric wave to short transverse.
Among Figure 27 1050 is dispensing device, and 1051,1052 is receiving system, and the emission characteristics of supposing respectively to install 1050,1051,1052 antenna is that its plane of polarization is the direction of arrow among the figure.Here, if dispensing device 1050 is replaced to dispatching station 1001, receiving system 1052 is replaced to receiving station 1002, dispensing device 1050 is inferred the plane of polarization of receiving systems 1052 and according to the plane of polarization of inferred results control dispensing device 1050, and such state is then with respect to the radio communications system 1000 of this example.
As shown in figure 27, even be arranged so that at plane of polarization and have the degree of freedom of observing under the situation of ground plane maintenance level of receiving system 1052, so along with the situation variation, communication environment also can produce bigger variation from plane of polarization with respect to dispensing device 1050.
Therefore, as dispensing device 1050, receiving system 1052, when making plane of polarization on same axle, though receiving system 1052 can receive in high sensitivity, and as receiving system 1051, the configuration plane of polarization makes under the situation vertical with dispensing device 1050, owing to the emission characteristics of antenna, received power is abundant inadequately, then quality of reception variation.
Here, do not have the situation of rotation to be illustrated for hypothesis plane of polarization in the radio transmission route that sends between receiving, and known plane of polarization is because reflection wait its meeting to change.Even under these circumstances, can be described as identical for the plane of polarization on the antenna end of each device.Under such state, the structure of this example because control sends ripple, so that dispensing device 1101 is identical with the plane of polarization of receiving system 1102, so need not adjust the plane of polarization of transmitter side and receiver side, just can carry out stable communication.
Moreover, want to adopt receiving system 1051 transmission and reception apparatus 1050 to describe for the 3rd with the situation of communicating by letter of receiving system 1052.Same as described above, the plane of polarization that receiving system 1051 must be set is consistent with the plane of polarization that sends from dispensing device 1050, so that receive in order.Yet, owing to send the wave polarization face according to the plane of polarization control of receiving system 1052, so can not know from receiving system 1051.
As mentioned above, because along with the direction plane of polarization that is provided with of receiving system 1052 can be different, this can not know usually.Again, even infer from the situation that is provided with of receiving system 1052 etc. under the situation of state of plane of polarization, because in fact the transfer path of dispensing device 1050 and 1052 of receiving systems, different with the transfer path of 1051 of dispensing device 1050 and receiving systems so can not know correct status.Therefore, the 3rd can not obtain communicating by letter of dispensing device 1050 and receiving system 1052.
Moreover as mentioned above, when producing the phenomenon of reflection and refraction etc. on transfer path, because electromagnetic plane of polarization changes, the 3rd is difficult to infer plane of polarization.Producing the environment repeatedly reflect and to reflect can be as within doors or the more places such as office of barrier such as indoor, partition wall.
Therefore, in this example, can consider that also dispatching station 1001 comprises the real information of security information and sends having on the electromagnetic wave of the linearly polarized wave of suitable plane of polarization stack for the antenna AN30 of receiving station 1002, the stack fake information sends on the electromagnetic wave of the linearly polarized wave with plane of polarization that perpendicular axle parallels simultaneously.
Thus,, relative therewith in receiving station 1002 in radio communications system 1000 because the characteristic of antenna AN30 can normally receive real information, can not receive fake information.Thus, do not need to adopt complicated structure, can optionally only receive real information.
Be that receiving station 1002 does not need to know in advance which signal is that security information, which signal are fake information.Again, in dispatching station 1001, need be for the data of separating receiver side array data, can freely implement to encrypt.Moreover, because the 3rd can not separate security information and fake information in theory, so can guarantee fail safe highly.
With above-mentionedly communicate by letter 1, communication 2 in the same manner, radio communications system 1000 makes that plane of polarization is consistent and communicates the communications of 3 beginnings.Therefore, after communication 3, transmit after can making the plane of polarization unanimity for all transmission data, and also can only make the security information of the particular importance that encryption key is such consistent with plane of polarization and after transmitting, only implement common encryption and send.
So, according to above-mentioned structure, except the structure of example 1, the transmission ripple that sends according to receiving station 1002 is inferred the plane of polarization of the antenna AN30 of receiving stations 1002 by the transmission environment deduction portion 1006 of dispatching station 1001, dispatching station 1001 is according to this inferred results, formation has the transmission ripple of the emission characteristics that receiving station 1002 only can receive, security information overlapped on this transmission ripple be sent to receiving station 1002, thus, except effect, can realize the more higher leveled radio communications system 1000 of fail safe with example 1.
Therefore, in this example, be example with horizonally-polarized wave, horizonally-polarized wave, and when for the plane of polarization of the angled inclination in ground, the 3rd with the more difficult security information of obtaining.For example, the dipole antenna that will have the linear polarization characteristic is angled with respect to ground and under the situation about being provided with, as mentioned above, with respect to the emission characteristics difference of horizontal direction antenna, emission characteristics changes along with the antenna angulation.Be that occurrence features is along with dispensing device shown in Figure 27 1050 changes with the relative position relation of receiving system 1052.As a result, the 3rd more difficult deduction plane of polarization.
Again, if adopt the antenna of helical aerials with perpendicular plane of polarization characteristic etc., control then can electrically be controlled plane of polarization to amplitude, the phase place of the generation signal of vertical polarization face.By such structure, visually be difficult to infer plane of polarization, can realize the more higher leveled system of fail safe.
Moreover, in the above description, have from beginning output at first that the electromagnetic situation of the linearly polarized wave of suitable plane of polarization is illustrated for dispatching station 1001 for the antenna AN30 of receiving station 1002, and when inserting power supply, till the characteristic of the antenna AN30 that infers receiving station 1002, also can be emitted as the electromagnetic wave of circularly polarized wave from dispatching station 1001.If like this, then the emission characteristics of receiving station 1002 and antenna AN30 irrespectively can stably receive the signal that the dedicated radio link of RACH (Random Access Channel, RACH) etc. is used.
In this example, at symbol on the employing time independently under the situation of modulation system, whether can set and to implement encryptionization above-mentioned, carry out information by the control plane of polarization for each symbol again.Thus, encrypt, then can carry out stable communication by a part for symbol.
(example 11)
For adopting among Figure 28 that same-sign represents with the corresponding part of Figure 19,1100 represent the radio communications system of the invention process form 11 on the whole.Except the antenna part 1102 of receiving station 1101 is that antenna AN60, the AN61 of vertical 2 linearly polarized waves constitutes by plane of polarization, simultaneously, be provided with in receiving station 1101 outside the emission characteristics control part 1104 of emission characteristics of control antenna portion 1102, radio communications system 1100 is identical with the structure of the radio communications system of Figure 19.
Secondly, describe for the action of radio communications system 1100 with reference to Figure 24.Here because dispatching station 1001 is identical with example 1 with the transmission time of reception between the receiving station 1101, describe so only be conceived to adjust the plane of polarization of electric wave again.
At first, receiving station 1101 sends (1T delivers letters) polarized wave deduction signal (communication 1).At this moment, emission characteristics control part 1104 is by sending the emission characteristics of acceptance division 1103 control antenna portions 1102, so that from the plane of polarization of antenna part 1102 outputs as benchmark.This sends signal owing to reflection and refraction on the transfer path 1101, and plane of polarization produces rotation, under through the state that postpones, by antenna part 1003 receptions of dispatching station 1001.
Dispatching station 1001 from 1 reception (trusted 1B) signal of communicating by letter, infers the plane of polarization of receiving station 1101 as benchmark in transmitting environment deduction portion 1006, and the storage inferred results.Secondly, emission characteristics control part 1008 is controlled, so that plane of polarization infers that with respect to transmitting environment deduction portion 1006 plane of polarization as benchmark of gained only rotates predefined certain angle, and sends (2B delivers letters) communication 2.
Receiving station 1101 utilizes the emission characteristics of emission characteristics control part 1104 control antenna portions 1102, so that only rotate the above-mentioned angle that emission characteristics control part 1008 makes the plane of polarization rotation from the plane of polarization as benchmark, and receives (trusted 2T) communication 2.
That is, in the emission characteristics control part 1104 of the emission characteristics control part 1008 of dispatching station 1001 and receiving station 1101, only store the rotation information of the plane of polarization that both have in advance.Therefore, owing to begin only to rotate equal angular from the benchmark plane of polarization from the plane of polarization of the plane of polarization of the communication 2 of dispatching station 1001 and the emission characteristics of receiving station 1101 controls, so receiving station 1101 can communicate by letter 2 with optimal emission characteristics reception (trusted 2T).After this, dispatching station 1001 carries out identical communication with receiving station 1101.
So, according to above-mentioned structure, on the structure foundation of example 10, even in receiving station's 1101 sides, also, between dispatching station 1001 and receiving station 1101, have the rotation information of plane of polarization simultaneously can change accordingly and obtain emission characteristics and constitute receiving station 1101, by making both consistent the communicating of plane of polarization, thus, on the basis of the effect that obtains example 10, can also realize the radio communications system 1100 that fail safe further improves.
That is, even if the 3rd know the plane of polarization of communication in 1, in communication 2 owing to changed plane of polarization, so be difficult to know this plane of polarization after changing.If for each communication rotatory polarization face, then can further improve fail safe again.
Moreover, for the additional information independently separately of 2 vertical plane of polarizations, be benchmark with the plane of polarization of communicating by letter in 1, also can separate each information.If so, can make that then conveying capacity is original 2 times, and can realize the high communication of the 3rd confidentiality that can not infer.
Generally, the frequency and the moment of using during 1001 notice receiving stations 1101 of dispatching station can communicate by letter, receiving station 1101 adopts these resources to communicate.Again, usually, receiving station 1101 adopts these resource monitoring transmission states and begins communication in the moment that is transmitted as the free time.As their condition, frequency is a principal element with these 2 of the moment, and in this example, by to they additional polarized waves, can make the capacity maximum of communication body be increased to 2 times.
Yet, at this moment, though frequency and time have space homogeneity, and owing to the polarized wave state can change along with transfer path, so along with different its environment in place are also different.Therefore, the problem of polarized wave disturbance regime is, and is different with receiving station 1101 its positions in dispatching station 1001.Yet, polarized wave state in the transfer path 1011 of dispatching station 1001 and receiving station 1101 is an environment much at one, when for example dispatching station 1001 is foresighted environment or their approaching mutually environment with receiving station 1101, as mentioned above, also can realize utilizing the demultiplexing of polarized wave.
So, communicate by letter these 2 communications under the overlapping situation of polarized wave under the identical moment, the same frequency between communication between dispatching station 1001 and receiving station 1101, dispatching station 1001 and other receiving stations, if make 2 communication synchronization and switch plane of polarization for each section period, then the 3rd be difficult to separate these 2 communications, can improve fail safe.
On the other hand, when in the environment that can not expect, for fear of the interference of intercommunication mutually, by receiving station 1101 monitor from around the communication conditions sent of other receiving stations, and notify dispatching station 1001 with monitor message, if send after can not producing interference mutually having adjusted, then can with foreseeable condition under carry out same communicating by letter.
When the environment of research multipath, because the direction of rotation and the angle difference of the plane of polarization in each path, have nothing in common with each other from the plane of polarization in each path again.In this example, in receiving station 1101, optionally receive particular path according to the situation of plane of polarization.Consequently, owing to can limit from dispatching station 1001 to receiving station 1101 transfer path 1010, so can alleviate the influence that multipath brings.
(example 12)
The radio communications system 1200 of this example as shown in figure 29, the dispatching station 1201 that sends security information has 2 of being configured on the diverse location and receives sending parts 1203,1204.Again, 2 send acceptance division 1203,1204 and carry out directive sending by different separately transfer path 1207,1208 with the suitableeest transmitted power that receiving station 1202 only can obtain security information.
Receive received signal by transmission acceptance division 1203,1204 and be sent to the environment deduction portion 1205 that transmits.Transmit environment deduction portion 1205 infers 2 transfer paths 1207,1208 according to 2 received signals environment.Particularly, infer signal transmission time and signal direction of arrival in each transfer path 1207,1208.
Transmit environmental adaptation portion 1206 according to the inferred results that transmits environment deduction portion 1205, control sends the transmission action of acceptance division 1203,1204 when receiving station 1202 sends security information.Particularly, at first, control respectively sends the delivery time of acceptance division 1203,1204, so that the signal that sends from each transmission acceptance division 1203,1208 was received by receiving station 1202 in the predefined time of reception.Secondly, carry out directive property and send, so that the directive property when respectively sending transmission in the acceptance division 1203,1204 is for towards receiving station 1202.
Adopt Figure 30 of prosign to represent the concrete structure of dispatching station 1201 with the counterpart of Fig. 2.As shown in Figure 30, for sending acceptance division 1203,1204 at 2 shown in Figure 29,2 array antenna AN70, AN71 only are set on diverse location only, signal processing is identical.And the direction of arrival deduction portion 1210 of Figure 30 and retardation deduction portion 120 are equivalent to the environment deduction portion 1205 among Figure 29, simultaneously the beam-forming device 1222 of Figure 30 and the transmission environmental adaptation portion 1206 that time control part 118 is equivalent to Figure 29.
Here, send time of security informations, in above-mentioned example, specifically describe, in this example, be sent as emphasis with the directive property of security information and describe for dispatching station 1201.
Direction of arrival deduction portion 1210 when the output by 2 array antennas of radio reception portion (trusted RF) 121 input, the direction of arrival of inferring the signal that sends by receiving station 1202 according to the amplitude and the phase place of these received signals.Particularly, change the weight coefficient that the received signal with 2 array antenna AN70, AN71 multiplies each other respectively successively, be maximum weight coefficient, thus, infer direction of arrival by addition value after obtaining weighting.Then, the inferred results that will be inferred by direction of arrival deduction portion 1210 (that is, for each array antenna AN70, AN71 weight coefficient) sends to the beam-forming device 1222 of the portion of delivering letters 1220.
Here, constitute burst signal formation portion 1221, beam-forming device 1222 and the modulation portion 1223 of sending part 1220 as shown in figure 31 like that.Therefore, the sending part 1220 of this example carries out demultiplexing when will sending data and carrying out sign indicating number diffusion.
The user data input data partitioning circuitry 1230 of burst signal formation portion 1221 and after encrypting with encryption key.Data partitioning circuitry 1230 is divided into the data of input a plurality of data (in this example being 2 is D12a, D12b) and delivers to continuous convolution circuit 1231a, 1231b.Here, though sending total diffuse code between the reception, do not needing total divided data D12a, D12b to correspond respectively to which sign indicating number in advance.Yet, pre-determine the big signal of received power and be data D12a, another is data D12b.Here, the private data of encryption key and enciphered data etc. is data D12a, and another data are data D12b.
Convolution circuit 1231a, 1231b utilize the data of input and the sign indicating number of code generation circuit 1232 generations to carry out convolution algorithm, thus, will import data and carry out the sign indicating number diffusion.Gain controlling (GC) circuit 1234b, 1234c with each the data incoming beams building mortion 1222 after the sign indicating number diffusion.Again, the false signal that generates by false signal generative circuit 1233 to gain control circuit 1234a input.
Gain control circuit 1234a~1234c is according to the gain of respectively importing data from the inferred value control of direction of arrival deduction portion 1210.Output input aerial matrix circuit 1235a~1235c with each gain control circuit 1234a~1234c.Will be from the inferred value of direction of arrival deduction portion 1210 also input aerial matrix circuit 1235a~1235c.
Each antenna array circuit 1235a~1235c multiply by basis from the inferred value (optimum weighting coefficient) of direction of arrival deduction portion 1210 and the vector value of the accepting state in the receiving station 1202 (received power and delay dispersion etc.) in the output of corresponding gain control circuit 1234a~1234c.Particularly,, carry out signal power control, make in receiving station's 1202 received powers to maximum or minimum according to the transfer path environment of inferring.
Here, for the input security information antenna array circuit 1235b, according to the inferred value of trying to achieve by direction of arrival deduction portion 1210, setting data D12a so that receiving station's 1202 incoming levels be the maximum.Similarly, in the antenna array circuit 1235c of input data D12b, according to inferred value, setting data D12b so that receiving station's 1202 incoming levels be enough greatly and these data D12b littler than data D12a.Thus, the security information after receiving station 1202 is cut apart with different incoming level receptions.
Relative therewith, in the antenna array circuit 1235a of input fake information, control, so that form zero-bit (because wave interference, power is zero position) in receiving station 1202 according to the inferred results of trying to achieve by direction of arrival deduction portion 1210.Thus, then do not receive false signal, and receive false signals with other receiving stations on receiving station 1202 diverse locations in receiving station 1202.
Data synthetic/the frequency-conversion circuit 1237 by modulation portion 1223 that respectively sends that is carried out vector quantization by antenna array circuit 1235a~1235c carries out vector addition, and thus obtained cell value is carried out frequency conversion under the frequency that local oscillator 1236 obtains.Cell signal after the frequency conversion is exported from the pairing element antenna of array antenna AN70, AN71.
As mentioned above, dispatching station 1201 with data D12 distribute to the antenna emission characteristics main lobe, data D12b is distributed to secondary lobe, fake information is distributed to zero-bit, thus, the receiving station 1202 that the accepting state of control receiving station 1202 sends object as security information thus can receive data D12a, the D12b of the security information after cutting apart well with the state that has difference power respectively, but in other receiving stations since make the difference power counter-rotating of D12a, D12b or fake information obstruction and can not receive security information.
In Figure 32, the modulation portion 1241 of the acceptance division 1240 of expression receiving station 1202 and the structure of data flow formation portion 1242.And other structures of receiving station 1202 are identical with the structure of receiving station 102 shown in Figure 3.The output that demodulation section 1241 will receive RF portion 140 (Fig. 3) is input to convolution circuit 1243.Import the sign indicating number identical from code generation circuit 1244 to each convolution circuit 1242 with the diffuse code of employing the dispatching station 1201.
The moment of convolution circuit 1243 appointment by timer 145 time is carried out convolution algorithm.Thus, export and the corresponding data D12a of diffuse code, D12b with each incoming level information from each convolution circuit 1243.For example, from certain convolution circuit 1243 output security information, from another convolution circuit 1243 output security informations information intentionally in addition, again from another convolution circuit 1243 output fake informations.Adopt these dateouts and incoming level, each data of selection/separation.Thus, in other receiving stations, be difficult to know and utilize diffuse code to carry out the most in good time quarter of convolution algorithm, and, promptly allow to know the most in good time quarter, owing to receive, can not select/separate above-mentioned each data with different incoming levels.
Send to data arrangement conversion/selection circuit 1247 that data flow forms circuit 1242 from the data of convolution circuit 1243 outputs by wave detector 1245, deliver to amplitude detecting circuit 1246 simultaneously.Amplitude detecting circuit 1246 detects the amplitude of each data.Here, dispatching station 1201 sends control for receiving station 1202, so that data 12a is that maximum level, data D12b are for being minimum incoming level than its little level, fake information, so from the information of amplitude detecting circuit 1246 outputs with the corresponding incoming level of each data.
The testing result that is obtained by amplitude detecting circuit 1246 is sent to data arrangement conversion/selection circuit 1247.Data arrangement conversion/selection circuit 1247 is according to the testing result that is obtained by amplitude detecting circuit 1246, according to the big or small scrambling transformation of the amplitude data from wave detector 1246 outputs.Then, with the data of amplitude maximum as the secondly big data of D12a, amplitude as D12b and the dateout row.
Secondly, describe for the action of the radio communications system 1200 of this example with reference to Figure 33.
At first, receiving station 1202 exports (1T delivers letters) predetermined transfer path deduction signal for dispatching station 1201 by communication 1.In dispatching station 1201, send acceptance division 1203 (the array antenna AN70 of Figure 30) reception through the signal of the 1st transfer path 1207, by the signal of the 2nd transmission acceptance division 1204 (the array antenna AN71 of Figure 30) reception through the 2nd transfer path 1208 by the 1st.
At this moment, dispatching station 1201 uses signal by sent acceptance division 1204 receptions by the 1st transmission acceptance division 1203 and the 2nd as the transfer path deduction of known signal, infers the transfer path environment of the 1st transfer path 1207 and the 2nd transfer path 1208.
Dispatching station 1201 utilizes the transfer path environment of inferring on the contrary and controls the signal that sends acceptance division 1204 outputs from the 1st transmission acceptance division 1203 and the 2nd from the signal from receiving station 1202.Particularly, the transmission environmental adaptation portion 1206 of dispatching station 1201 sends acceptance division 1203 and the 2nd according to the transfer path environment of inferring (receiving the direction of arrival of electric wave) control the 1st and sends acceptance division 1204 and output (2B delivers letters) signal (communication 2), so that the signal power of the security information of the receiving terminal of receiving station 1202 increases.After this, similarly communicate the communication of 3 beginnings.
In communication 2, send security information to receiving station 1202 from dispatching station 1201.Communication 2 information as send from the 1st of dispatching station 1201 acceptance division 1203 through the information of the 1st transfer path 1207 with send acceptance division 1204 from the 2nd and receive (trusted 2T) by receiving station 1202 through the synthetic result of the information of the 2nd transfer path 1208.As mentioned above, owing to control communication 2 makes the signal power on the receiving terminal of receiving station 1202 increase, so receiving station 1202 can stably carry out trusted 2T, and can the demodulation security information.
Again, so the signal of exporting (communication 2) sends acceptance division 1203 and the 2nd from the 1st and sends acceptance division 1204 these 2 outputs, pretends to synthesizing result's signal along with the difference of reception site is different in the space.As mentioned above, though send control so that the received power on the receiving terminal of receiving station 1202 is maximum, and importantly will control so that communication quality improves, under situation about descending owing to communication qualities such as postponing ripple, it also is effective reducing received power and reducing the multichannel composition.
On the other hand, when receiving, the 3rd of non-transmission purpose comprises the communication 2 of security information and when wanting therefrom to obtain information, even by communication 1 acquired information, owing in communication 2, send control so that the suitableeest received signal is synthesized in the space on the receiving terminal of receiving station 1202, even event the 3rd receives this signal, this signal level is also different, also is difficult to obtain information.
Under the situation of this example, in communication 2,, on the basis of security information, fake information carried out sign indicating number and cut apart demultiplexing and send in the identical moment again.Like this, in receiving station 1202, adopt the diffuse code identical to restore each information data with receiving station 1201.Here, change under the situation of sign indicating number sequence for each data as implementing form, because the frequency key element difference that this yard sequence has, the influence that is subjected in transfer path is also different.
Thus, as this example, by making security information be distributed to multiplex (MUX), owing to the caused influence of the mutual transmission status of channel is different, so the 3rd more difficult acquisition security information.
Up to the present be to send acceptance division 1203 and the 2nd and send the transmission signal of acceptance division 1204 and make to attach most importance on the receiving terminal of the suitableeest received signal arrival receiving station 1202 and be illustrated in the explanation to control the 1st again.Below, attach most importance to following content and to describe, that is, at overlapping 2 channels (security information, fake information) under the identical moment, the same frequency and to adopt transmission signal more than 2 to carry out the space synthetic, control the received power on the receiving terminal of receiving station 1202 independently for each channel.
Dispatching station 1201 according to receive from receiving station 1202 (trusted 1B) to the transfer path as known signal infer and use signal, infer the 1st transfer path 1207 and the 2nd transfer path 1208.Next, the sign indicating number that dispatching station 1201 carries out 2 channels with 2 types information is cut apart demultiplexing and is sent to receiving station 1202.
Here, as the channel that distributes respectively,, then select the channel of vertical relation in order to make the diffusion gain equate.At this moment, as the 1st information, send security information according to the transfer path situation of inferring, so that on the receiving terminal of receiving station 1202 be the suitableeest accepting state.Here, be meant as the suitableeest reception situation and control so that the received power maximum.Be meant according to transfer path situation control of inferring and transmission fake information, so that received power is less than the situation of the 1st information on the receiving terminal of receiving station 1202 as the 2nd information.
The communication 2 of so launching is carried out synthetic on the space and is received by receiving station 1202.As result synthetic on the space, on receiving terminal, the 1st information as powerful signal, the 2nd information as low power signal and cut apart at sign indicating number under the state of demultiplexing and be received.Adopt diffuse code that the burst that receives is carried out back-diffusion, thus, can take out both signals, and owing to set the diffusion gain and equate, then according to the received power of each signal, side's power increases and the opposing party's power diminishes.In receiving station 1202, select the information of the big channel of this received power to handle as fake information as security information and with the information of another channel, thus, can easily select security information.
On the other hand, even the 3rd receive this information and restore, because the accepting state of the 1st information is different along with reception site with the accepting state of the 2nd information, so, can not from the received signal sequence, know as if do not learn in advance.Therefore, the 3rd can not know communication 2.
So, by carrying out the frequency diffusion, owing to the repellence that has improved for noise, so can obtain further to improve the effect of communication quality.
Therefore, channel for the fake information that superposeed, be described so that synthesize the situation of the power reduction that receives for controlling by each transfer path 1207,1208, and make that its received power of channel of stack false signal is 0, promptly controlling so that under the situation of cancelling out each other, have such advantage, promptly the area of space of Di Xiaoing is extremely narrow zone.
Here, the synthetic electromagnetic situation in space as shown in figure 34.Figure 34 represents the situation of the standing wave that 2 electromagnetic waves produce.Transverse axis represents that position, the longitudinal axis represent power.From this figure as can be known, when maximum level is standardized as 0dB, approximate location-more than the 10dB.Again, by the space synthesize-below the 20dB, electric wave is cancelled out each other, and has spike on the low position of power, only by deviation post slightly, power just rises rapidly.
Utilize this characteristic, for example, the signal power of the 1st information is set at-10dB and send control so that offset at receiving terminal under the situation of the 2nd information, as seen, the zone that can ignore the obstruction of the 2nd information only is the localized area, and can not correctly receive the 1st information in most of zone.That is, outside the place that the receiving station 120 as communication target is positioned at, the 1st information can be subjected to the obstruction of the 2nd information.Thus, the 3rd be difficult to the 1st information that obtains.
So, according to above-mentioned structure, security information is being sent by the moment that receiving station 1202 receives in setting constantly by a plurality of transfer paths 1207,1208, and, the directive property of control dispatching station 1201 is so that receive the received power maximum of these security informations in the receiving station 1202 that sends purpose as security information, thus, the 3rd more difficult acquisition security information, and can be implemented in the radio communications system 1200 that receiving station 1202 can obtain the good security information of communication quality.
In this example, there is close relation with the array antenna technology again.This technology has can this remarkable advantage of electrical control emission characteristics, has just utilized this technology in this example energetically.
Therefore, can apply flexibly the advantage that array antenna itself has, for example at this point, when carrying out illustrated communication 2, with the communicating by letter of receiving station 1202 in, can also implement the communication of other channels for irrelevant direction, perhaps in the communication under the multipath environment, can also control emission characteristics.By so, can increase message capacity, perhaps also can reduce the influence of multichannel.
(other examples)
(1) again, in above-mentioned example, for will as moment of the benchmark of receiving terminal fiducial time when being described by 1 situation that sends to network fiducial time of receiving station of communicating by letter as dispatching station, and the present invention is not limited thereto, as long as have the consistent moment between dispatching station and receiving station.For example, also can with the predefined moment as benchmark.If send benchmark notification signal constantly to dispatching station, can infer that then the dispatching station that transfer path postpones can make that constantly benchmark is constantly consistent with receiving station the time of reception of notification signal according to benchmark from receiving station again.
(2) again, in above-mentioned example 4, be described in the situation that delivery time sends for dispatching station, described delivery time is meant the feasible delivery time that comprises the transmission data of security information in the receiving terminal arrival of being set by receiving station fiducial time, and the present invention is not limited thereto, also can only be offset the delivery time of stipulated time at the receiving terminal of setting with respect to receiving station fiducial time, send the transmission data that comprise security information by dispatching station.At this moment, receiving station adopts the synchronization sequence signals that is only obtained by the receiving station's extraction that sends object as security information to receive processing as implementing described in the form 4.
Particularly, describe with reference to Fig. 4.At first, dispatching station sends for receiving station and comprises the network control signal of fiducial time (communication 1).Secondly, receiving station sends (communication 2) response signal in certain hour (T1) back for dispatching station, sets receiving terminal benchmark (Tk) constantly simultaneously.Secondly, dispatching station is from communicating by letter 1 and communicate by letter and infer the state of transfer path 2.Infer signal transmission time (Td) specifically.
Secondly, dispatching station communicates 3 for receiving station.At this moment, calculate delivery time in the processing delay time that dispatching station produces from infer the signal transmission time (Td) that obtains and install, and the control delivery time.The dispatching station time of carrying out is gone up control so that communicate by letter 3 the receiving terminal benchmark constantly (Tk) arrive receiving station, and this moment, the retardation (Ts) that will determine according to additional information is with the moment (Tk) addition of receiving terminal benchmark and send and communicate by letter 3.
As a result, in receiving station, at the moment (Tk+Ts) received communication 3.In receiving station, be received communication 3 is carried out at the center in the scope of several symbols processing with constantly (Tk), carry out time synchronized thus.Here, can carry out time synchronized and be because, in sending signal with known format configuration synchronization sequence signals between dispatching station and the receiving station only.That is,, just in time do not arrive, can utilize synchronization sequence signals to receive processing yet at receiving terminal fiducial time (Tk) even send data for the receiving station of structure described in the example 4.
Like this, poor (Ts) of the result of time synchronized and (Tk) constantly as additional information, applied to other and handle system.At this moment, adopt the following application of additional information research.
The 1st, between transmission receiving station, pre-determine a plurality of scramble forms, switch these scramble forms according to additional information.The 2nd, security information is divided into a plurality of, utilize additional information to transmit its kind.That is, dispatching station is divided into the 1st and the 2nd information with security information and sends, receiving station when additional information (Ts) be timing, cut apart the security information demodulation with the 1st, when when bearing, cut apart the security information demodulation with the 2nd.Moreover, the 3rd, prepare a plurality of encryption modes in advance, (Ts) switches these patterns according to additional information.
So, then, in other receiving stations more difficult recovery security information just.Again, dispatching station and receiving station for the transmission of carrying out security information receives in (Ts) arrival constantly of receiving terminal benchmark, also can restore security information, so design freedom increases even without just in time.
(3) again, in above-mentioned example, be described by the situation of dispatching station control delivery time by receiving terminal arrival fiducial time of receiving station's setting for the feasible signal that sends from dispatching station for full detail, and the present invention is not limited thereto, can be only carrying out above-mentioned transmission for the transmission of the security information of the such particular importance of encryption key receives, for other information, synchronizing signal that can additional pilot signal etc. sent in the common moment.So, the appended synchronization signal does not carry out the synchronous demodulation processing, thus, the unsteadiness of separating timing can be suppressed to Min., can improve whole communication quality.
In above-mentioned example, for the situation that by a plurality of symbols constitute synchronizing sequence, pseudo-synchronizing sequence be described, and the present invention be not limited thereto, also can respectively a symbol be made of (4) again.Again, the part that can be pseudo-symbol, information symbol and synchronizing sequence also with pseudo-synchronizing sequence double as.
As synchronizing sequence, for example, can adopt the dull mode sequences of repetition as sine wave again.At this moment, the receiving terminal 1 that sends object as security information can be inferred the time started of this synchronizing sequence, and relative therewith, receiving terminal 2 can not be inferred the time started which pattern is a synchronizing sequence.Therefore, even make that the part of synchronizing sequence is pseudo-synchronizing sequence, because the reference phase that obtains from synchronizing sequence changes (rotation) in time, so can obtain the effect identical with above-mentioned example.
Again, need not synchronizing sequence is defined as a kind, also can adopt the synchronizing sequence of a plurality of kinds.So, the 3rd carries out demodulation and decoding with regard to more difficult to security information.Moreover as if the kind according to synchronizing sequence, the form of the configuration of change expression information symbol and pseudo-symbol then can further be guaranteed fail safe.
(5) again, in above-mentioned example, be described for the situation that on pseudo-symbol, is loaded with fake information, and the present invention is not limited thereto, also can be on pseudo-symbol be loaded with error-detecting function and error correction function for the 1st regular information as the 2nd regular information.Again, also can replace to the convolution code sequence, be information sequence and this fake information sequence of representative with the block code sequence.
(6) again, in above-mentioned example, situation about communicating by the 1st transfer path and these 2 transfer paths of the 2nd transfer path for 2 sending parts are set in dispatching station is illustrated, and the present invention is not limited thereto, also can make that the transfer path that communicates is more than 3 by 3 sending part is set.
Moreover, in above-mentioned example, for being set in dispatching station, 2 sending parts realize that the situation of 2 transfer path communications is illustrated, and realize that a plurality of transfer path method for communicating are not limited thereto, for example, by each sending part is set at diverse location, also can realize the communication of different transfer paths.Again, the antenna that also sending part can be arranged on same position and adopt the directive property with each sending part to limit narrowly.Again, also can be when making that sending part is one, sending part is adopted adaptive array antenna, the characteristic of reflection by utilizing electric wave and refraction etc. forms different communication transfer paths.As long as form a plurality of transfer paths that can have between the radio communication station of security information communication of only carrying out mutually.
In above-mentioned example, for the purpose of simplifying the description, for the power of hypothesis pseudo-symbol be 0 situation be illustrated, and the power of pseudo-symbol might not be 0 (7) again.For reduce and useful symbol between interference, can be with the power reduction of pseudo-symbol to enough little.Again, also pseudo-symbol can be divided into a plurality of parts, so that enough little as the synthetic result's of vector power.
(8) in above-mentioned example, deduction method as the polarized wave state, the major axis of asking for elliptically polarized wave p and the example of antenna angulation and flat ratio have been exemplified, and in Figure 21 and structure shown in Figure 22, by only adopting electric field strength test section 1020 and electric field strength control part 1021, also can only try to achieve roughly major axis angle and control plane of polarization, the method as the control plane of polarization also can replace to such simple structure.
In above-mentioned example, be illustrated for the situation that adopts linearly polarized wave, and the present invention is not limited thereto, and also can obtain identical effect for circularly polarized wave again.At this moment, vertical polarization can be involved horizonally-polarized wave and replace to right-handed polarized wave, left-hand polarized wave.
In above-mentioned example 10,11, for the situation that dispatching station and receiving station between adopt a transfer path communicate be described, and the present invention be not limited thereto, obviously also can adopt a plurality of transfer paths reach identical communication (9) again.
At this moment, if stagger on the call duration time of the communication of feasible employing the 1st transfer path and employing the 2nd transfer path, can obtain the effect of time diversity.Otherwise,, then can obtain path diversity effect if carry out two communications simultaneously.Certainly, the 3rd infers that the transfer path more than 2 is more difficult than transfer path of deduction, so if information dispersion is arrived a plurality of transfer paths, then can significantly improve the fail safe of security information.
(10) again, in above-mentioned example 10, enumerated dipole antenna as antenna, and the kind of antenna is not limited to this, adopt under the situation of helical antenna or flat plane antenna, parabolic antenna, Yagi spark gap (radio frequency channel formula) antenna, other all antennas, also can obtain identical effect.Moreover, utilize adopting a plurality of antennas and directive property is carried out the technology of the adaptive array antenna of electrical control, Ruo Chao launches fake information, then the 3rd more difficult acquisition security information with the direction that has nothing to do of communicate by letter.Can change the angle of emission characteristics and plane of polarization again.Again, if adopt array antenna such can electric property control directive property antenna, then can easily be applicable to the communication means that adopts a plurality of transfer paths.
(11) again, in above-mentioned example, fail safe with security information is that the starting point describes, and infer except the above-mentioned environment that when security information is communicated by letter, transmits, after this communication also can transmit environment and infer, whether if compare both inferred results, also can authenticate receiving station in dispatching station is the communication object of security information.
(12) again, in above-mentioned example 10,11, being used to infer that with signal the situation that transmits environment is illustrated for the output polarization ripple, and inferring with signal it also can is sinusoidal wave as this polarized wave, also can be the burst that constitutes more than the symbol by.
Moreover, in above-mentioned example 10,11, for being that linearly polarized wave detects the anglec of rotation of the plane of polarization in the transfer path and the situation of amplitude is described by making polarized wave infer with signal, and for the signal that separates certain plane of polarization and signal with its vertical plane of polarization, for example, can send polarized wave deduction signal as if the time of staggering, perhaps distribute orthogonal polarized wave to infer with signal and carry out multichannel and send, then infer rotation and the phase difference that transmitter side and receiver side with signal can detect polarized wave at polarized wave.
(13) again, in above-mentioned example 12, for adopt diffuse code not only to security information, also fake information is carried out that sign indicating number is cut apart demultiplexing and the situation that sends to receiving station is described, and the present invention is not limited thereto, for example, also each data can be carried out the frequency division demultiplexing or carry out vertical frequency cutting apart and sending after the demultiplexing.
(14) in above-mentioned example 12, be described with the situation that the diffusion gain of the sign indicating number sequence of the 2nd information (fake information) equates for feasible the 1st information (security information) that is used for, and might not make it equal.Again, also might not be vertical, receiving terminal in receiving station, make received power have enough difference if control, then adopt under the situation that all identical sign indicating number sequences spread for the 1st information and the 2nd information, perhaps code length is under the situation of structure of 1 (promptly not spreading), also can realize.At this moment, for the 3rd received received signal, because the signal of the 2nd information of the fake information that superposeed becomes the obstruction ripple, so the 3rd can not obtain the 1st information.
Again, here, even for same sign indicating number is distributed to the 1st information and the 2nd information, also can implement situation of the present invention is described, to make the 2nd information carry out the received power of space when synthetic at receiving terminal enough little and if control, then almost only constitute received signal, and there is no need to separate the signal after the demultiplexing by the 1st information.That is, in the process of demultiplexing, do not carry out the sign indicating number diffusion, can obtain identical effect yet.
Therefore, about the 1st information and the 2nd information, according to the transfer path situation of inferring, also can be only by control so that the received power on the receiving terminal of receiving station to be a side big and with respect to this opposing party for enough little, and feasible the stack.If so, can not reduce transmission efficiency, and can utilize communication 2 to transmit security information.At this moment, if make the gross power of small-signal difference power above about 1dB be arranged, then they can be separated at receiver side with respect to the power of large-signal.
, in the above description, as demultiplexing mode, for code division multiple access (CDMA) mode of diffuse code being distributed to each carrier wave be described, and adopt the OFDM multichannel also can obtain identical effect (15) again.That is, under the situation of CDMA, control the synthetic power of each diffuse code, and adopt under the situation of OFDM, can control the synthetic power of each subcarrier.For example, also subcarrier can be divided into a plurality of groups (for example, odd sub-carriers and even number subcarrier), and control the synthetic power of each sub carrier groups.
(16) again, in example 12, for the 2nd information of the demultiplexing situation as fake information is illustrated, and the 2nd information also is not limited to fake information, for example, also can be the information of other channels.If so, then can improve transmission efficiency.Again, send as security information, can and decode according to size separation the 1st information of received power and the 2nd information in receiving station with the 1st information, the 2nd information.
Moreover except the 1st information, the 2nd information that sends out from dispatching station, also can superpose both performance numbers and the information of their size sequence or both power ratios etc. send.Again, not only be defined in 2,3, also the information more than 4 can be carried out demultiplexing and send by the 2 demultiplexing numbers that send data of communicating by letter.At this moment, in receiving station, be benchmark with the size of received power, these Signal Separation can be become the information of the 1st to n (n is the natural number more than 2) and decode.If so, even the 3rd acquired information then also because the transfer path difference, can not obtain the size order of correct received power, so the raising of the confidentiality of information.
In above-mentioned example 12, for dispatching station have 2 situations that send acceptance division be described, but the number of transmission acceptance division be not limited to 2 (17) again.Again, when adopting array antenna control emission characteristics, when making that antenna element is N, the offseting signal because the space is synthetic, and only to make N-1 signal power be 0 such zero characteristic.Describe for the method that adopts this speciality with reference to Figure 35.
As for adopting the shown in Figure 35 of same-sign, in radio communications system 1300, form the 3rd again in dispatching station 1301 and receive sending part 1302, and form the 3rd transfer path 1307 again as transfer path with the corresponding part of Figure 29.
With above-mentioned example 12 in the same manner, dispatching station 1301 is from the transfer path deduction signal of receiving station's 1202 receptions as known signal, thus, by transmitting the transmission environment that environment deduction portion 1303 infers the 1st transfer path the 1305, the 2nd transfer path the 1306, the 3rd transfer path 1307.
Secondly, dispatching station 1301 carries out 3 types information the Code Division Multiplexization of 3 channel shares and sends to receiving station 1202.For the channel that distributes respectively, select to make the diffusion gain to equate and have the channel of vertical relation.
At this moment, inferred results according to the 1st transfer path the 1305, the 2nd transfer path the 1306, the 3rd transfer path 1307 in the transfer path environment of inferring, send security information as the 1st information, thereby make and on the receiving terminal of receiving station 1202, become the suitableeest accepting state.Here, be meant to control as the suitableeest state and make the received power maximum.Inferred results according to the 1st transfer path the 1305, the 2nd transfer path the 1306, the 3rd transfer path 1307 in the transfer path environment of inferring, send fake information and carry out zero-location control as the 2nd information, thereby make that received power is for minimum on the receiving terminal of receiving station 1202.
At this moment,, adopt a wherein side, and setting the opposing party's zero characteristic is an appropriate state to keep communication for controllable 2 zero characteristics.Moreover, inferred results according to the 1st transfer path the 1305, the 2nd transfer path the 1306, the 3rd transfer path 1307 in the transfer path environment of inferring, send fake information and carry out zero-location control as the 3rd information, thereby make that received power is for minimum on the receiving terminal of receiving station 1202.At this moment, for making that the zero characteristic of a side in 2 zero characteristics is the state different with the 2nd information for characteristic the opposing party's identical with the 2nd information zero characteristic, carry out zero-location control for this reason and send.
3 information signals that so emit spatially synthesize and are received by receiving station 1202.As the synthetic result in space, on receiving terminal, under the state of Code Division Multiplexization, receive the 1st information, receive the 2nd information and the 3rd information as low power signal as powerful signal.
Adopt diffuse code to carry out back-diffusion, thus, can take out each signal for the burst that receives.Here, equate that according to the received power of each information, a power increases and another power reduction owing to set the diffusion gain.Select the information of high-power channel and adopt the information of another channel as security information in receiving station 1202, thus, can easily extract security information out as fake information.
Here, research is when the 3rd situation that receives security information and want to restore.At this moment, the accepting state of the accepting state of the 1st information and the 2nd, the 3rd information is different along with receiving position.If can not know this accepting state in advance, then can not from the received signal sequence, know.
Moreover the 3rd information emission characteristic of control demultiplexing so that form zero-bit in the same manner on the receiving terminal of receiving station 1202 with the 2nd information, and is controlled so that the state of zero-bit is different mutually.Here, though control zero-bit situation under, sometimes along with the condition difference, outside its control position, also can form zero-bit, for example, on the 3rd receiving position, though the 2nd information near zero-bit, the 3rd information also seldom is identical state.As a result, significantly reduce to the 3rd probability that leaks the security information content.So, in the structure that is provided with 3 transmission acceptance divisions, the structures than adopting 2 to receive sending parts can improve confidentiality significantly.
Similarly, increase to 4,5,6, make the demultiplexing number increase and also can further improve confidentiality by number with the transmission acceptance division of dispatching station.Again, suppress the demultiplexing number,, also can make the control High Level if the degree of freedom of the zero-location control of each demultiplexing information of raising then also can improve precision with respect to the number that sends acceptance division.Again, change the parameter designing in the zero-location control be used in each symbol,, then can further suppress the possibility of leaking security information to the 3rd if make that the position of the outer zero-bit that forms of control is not overlapping.
Again, for by the 2nd information and the 3rd information being carried out zero-location control and controlling so that the situation that the received power of the 2nd information and the 3rd information reduces is described in receiving station, and if control make that the received power of the 2nd information and the 3rd information is different with the 1st information and on the 1st to the 3rd information, add the information of received power size separately, then can make to have higher confidentiality.If each symbol is changed its control constantly, then more can prevent to leak.
In the above description, for the transmitted power of 1st information that by security information constitutes, situation about with transmitted power with other information of its demultiplexing equating be described (18) again.Yet, might not equate, for example,, can improve confidentiality if the transmitted power of the 1st information of setting is lower than other information.Otherwise, if the transmitted power of the 1st information of setting then can improve the communication stability of security information than other information height.Moreover, also can suitably adjust according to the environment of the radio communications system that is provided.
(19) in above-mentioned example, in explanation, transfer path is inferred with signal as known signal, even and be not known signal, also can infer transfer path.Yet, if known signal infer easily, and have the advantage can alleviate noise effect etc.If envelope is constant signal, then can be suitable for the CMA mode of calculating as the deduction of adaptive array antenna again.Moreover, when transmitting environment and change, because inferring, essential transfer path uses signal, so, then, can carry out secure communication by measuring its characteristic in advance if the transfer path that is formed between dispatching station and the receiving station is fixed.
As the antenna that be provided with a plurality of transmission acceptance division situations under, with array antenna be example be described, and be not limited to the structure of array antenna (20) again.If can control the coherence of modulating wave, then adopt the dispatching station more than 2 can carry out identical control.Again, if adopt array antenna such can the electrical control emission characteristics antenna, then dispatching station can with communication between the receiving station that transmits security information mutually independently, carry out with other radio stations between communicate by letter.At this moment, for each receiving station can be under the identical moment, same frequency with the signal of communication demultiplexing and send, this situation is same as described above.So, prevent the effect of leaking security information by increasing the demultiplexing number, can further improving to the 3rd.When only between a pair of dispatching station and receiving station, communicating,, then can guarantee the fail safe of maintaining secrecy if as mentioned above with the fake information demultiplexing when there not being other receiving stations.
(21) again, in above-mentioned example, as on security information with the multi-channel approach of a plurality of kinds of information demultiplexings, be that example is described with the Code Division Multiplex, and owing to can adopt the emission characteristics control of array antenna to select each information, be not particularly limited in multi-channel approach.
(22) again, the present invention does not limit and can utilize modulation system or multi-channel approach.For example, for communication illustrated in example 1~example 41, communication 2, communication 3, communication 4 ... each communication and example 5,6,7 in illustrated communication 10, communication 11, communication 20, communication 21, communication 30, communication 31, communication 4 ... each communication can be suitable for modulation system or multi-channel approach respectively.Especially, when infer transmitting environment, in communication 1 by being suitable for the such vector diffusion of example 1, can antidamping and can carry out inference process with good deduction precision.
Also can be suitable for ASK modulation system, FSK modulation system, differential code modulation system or OFDM (Orthogonal Frequency Division Multiplexing, orthogonal frequency-division) mode again.When adopting these modulation systems, especially, having does not need to carry out phase locked advantage.
Also can be suitable for PSK modulation or QAM modulation, pulse modulation etc. again.Moreover, owing to do not rely on the demultiplexing mode, also can adopt FDMA multichannel ripple, CDMA multichannel ripple, OFDM multichannel ripple etc.
That is, in above-mentioned example, be described for the situation of controlling the transmission of security information with time or channel unit, and, then can control plane of polarization for each carrier wave if adopt the multi-carrier modulation of CDMA multichannel ripple and OFDM multichannel ripple etc.Therefore, except the different control of asynchronism(-nization), channel,, can further control by carrying out the different control of carrier wave.The result is the confidentiality that can significantly improve for the 3rd.
Again, the symbol rate in the communication 3 of example 1 is set at the communication of being lower than 1, communication 2 symbol rate, then can relatively improves the precision that transfer path postpones.At this moment, by communication 3 symbol rate with from communicating by letter for 1 processing time to communication 3, determine the precision that the position between dispatching station and the receiving station concerns, so can set different values according to system design.
Similarly, in example 5,6,7, by communication 30, communication 31 symbol rate and communicate by letter 10, determine the precision that the position of dispatching station and receiving station concerns, so can set different values according to system design to communicating by letter 30 or communicate by letter 11 to the processing time of communicating by letter till 31.
So, the present invention is not limited to modulation system, multi-channel approach, owing to can not have influence on other Information Levels, so have and the high affinity of system in the past.By making up, can realize the fail safe of height, so can be widely applicable for the information communication field that personal information, Financial Information, confidential information etc. need high safety with encryption technology again.
(23) again, in above-mentioned example, be described by the situation of inferring the signal transmission time in the transfer path and utilize the transmission reception between this signal transmission time acquisition transmission reception to make other users can not restore security information synchronously, and utilize under the situation of other transfer path environment that can have between the radio station that only communicates, also can obtain the effect identical with above-mentioned example.Transmit in the environment at this, multipath environment and decay environment etc. are for example arranged, also can utilize these environment compoundly.Again, even also comprise device between dispatching station and the receiving station poor (for example the difference of reference frequency etc.), and, can realize higher fail safe by being applied to communication.
(24) again, in above-mentioned example, for the purpose of simplifying the description, be illustrated as receiving station as dispatching station, the radio station that will receive this information for the radio station that transmission is comprised security information, but the present invention is not limited thereto, and gets final product so long as can carry out the transmission reception of security information each other.
(25) again, in above-mentioned example, be described for such situation, promptly, dispatching station comprises the network control signal of fiducial time as being used to obtain send with receiving station synchronous signal, thus, total identical base period between dispatching station and the receiving station, and with network constantly Tk as the security information due in, yet, the present invention is not limited thereto, even without total identical benchmark constantly, also can with above-mentioned example in the same manner, make security information arrive in the moment that receiving station sets.
Be explained with reference to Figure 36.Dispatching station sends communication 1 at moment t1.In this communication 1, make different and do not comprise information fiducial time with example.Receiving station is at moment t2 received communication 1.Then, in the moment of elapsed time T1 t3 receiving station transmission communication 2.Dispatching station is at moment t4 received communication 2.Then, receiving station sends communication 2 ' (sending essential total this time between the reception) after after a while at moment t5.Dispatching station is at moment t6 received communication 2 '.Dispatching station sends communication 3 at the moment t7 after moment t6 elapsed time Td.Here, dispatching station and receiving station preserve from trusted 1T as total information and begin to the time T 1 of the 2T that delivers letters and from the time T 2 of 2T ' to trusted 3T of delivering letters.
Here, signal transmission time during as Tw, is satisfied the following formula relation.
t4-t1=2×Tw+T1…(1)
Then, signal transmission time Tw can represent with following formula.
Tw=(t4-t1-T1)/2…(2)
To arrive in receiving terminal fiducial time 1 (t8 constantly) in order making, can to represent the moment t7 that dispatching station sends from the relation of moment t5, t6 and T2,
t7=t8-Tw=(t5+T2)-Tw
=t6+T2-2×Tw …(3)
That is, adjust time T d=(=t7-t6) can be expressed from the next.
Td=T2-2×Tw=T2-(t4-t1-T1)…(4)
So, the adjustment time T d that is used for the dispatching station delivery time can be represented by dispatching station known moment t1, t4 free together information T1, T2, so dispatching station is according to formula (4), can send the transmission data that comprise security information making security information at the delivery time that moment t8 arrives receiving station.
The present invention is not limited to above-mentioned example 1~12 and other examples, also can implement by all conversion.For example, can appropriate combination above-mentioned example 1~12 and other examples and implement.
Data link of the present invention is the data link that the transmission data of utilizing radio will comprise security information are sent to radio station, and it adopts following structure, promptly possesses: the acceptance division that receives the signal that is sent by described radio station; Deduction portion according to the radio transmission path circumstances between received signal deduction that obtains by described acceptance division and the described radio station; The transmission data that the radio that research is obtained by described deduction portion transmits path circumstances and will comprise described security information send to the sending part of described radio station.
According to such structure, transmit path circumstances and consider that this radio transmits path circumstances and sends the transmission data that comprise security information owing to utilizing deduction portion only to infer and comprising radio total between the radio station of transmission object of transmission data of security information as transmission, so can not receive or restore security information at other different radio stations of radio transmission path circumstances.As a result, can transmit security information with high security.
Again, data link of the present invention adopts following structure, promptly, described deduction portion according to described received signal infer with described radio station between signal transmission time and as described radio transmission environment, described sending part sends described transmission data in the moment of considering described signal transmission time, so that described transmission data reach described radio station in the desired time of reception.
According to such structure, at radio station, arrives in the predefined time of reception, so, can restore security information by making and this synchronous constantly also restituted signal owing to comprise the transmission data of security information as the transmission object of security information.Relative therewith, the radio station beyond the radio station that sends object as security information then can not restore security information.This be because, expression receive and information fiducial time of demodulation zero hour be according to data link only with determine as signal transmission time total between the radio station that sends object, so other radio stations can not be known the fiducial time in the benchmark moment of expression reception and demodulation zero hour.As a result, other radio stations can not restore security information, and fail safe is guaranteed.
Again, data link of the present invention adopts following structure, promptly, possess in comprising the transmission data of described security information, and described radio station between the pseudo-symbol appendix of additional pseudo-symbol on the predetermined position, the transmission data that described sending part will add pseudo-symbol send to described radio station.
According to this structure, send the position of the radio station of object as security information, so after receiving demodulation sends data, can easily extract security information out by only taking out pseudo-symbol owing to known pseudo-symbol.Relative therewith, other radio stations contingency can demodulation send data, owing to have pseudo-symbol, so can not extract security information out.The result can further improve fail safe.
Again, data link of the present invention adopts following structure, promptly possesses: in comprising the transmission data of described security information, and described radio station between the additional synchronization sequence signals appendix that has the synchronization sequence signals of synchronized relation mutually on the predetermined position; Additional pseudo-synchronous signal as described synchronization sequence signals, in the pseudo-synchronous signal appendix of the pseudo-synchronization sequence signals that has synchronized relation each other.
According to this structure, make security information and send the position of the radio station of object, so can easily extract synchronizing signal out owing to known synchronization signal.Radio station can adopt the synchronizing signal of extraction carry out time synchronized and, detected phase change, detect gain variations etc.As a result, can improve the quality of reception.Relative therewith, security information can not be restored at other radio stations, and pseudo-synchronous signal and synchronizing signal can not be distinguished.So, can obtain the data link that fail safe is higher and quality of reception radio station improves.
Again, data link of the present invention is the data link that sends to radio station that will comprise security information by radio, it adopts following structure, promptly possesses: the 1st and the 2nd acceptance division that is configured in the signal that mutually different locational reception sent by described radio station; Infer that according to the received signal that obtains by described the 1st acceptance division the 1st radio between described the 1st acceptance division and the described radio station transmits path circumstances and infers that according to the received signal of described the 2nd acceptance division acquisition the 2nd radio between described the 2nd acceptance division and the described radio station transmits the deduction portion of path circumstances simultaneously; Be configured in respectively with the described the 1st and the 2nd acceptance division same position on, the described the 1st and the 2nd radio that obtained by described deduction portion of the research transmission data that transmit path circumstances and will comprise described security information send to the 1st and the 2nd sending part of described radio station.
According to this structure, utilize deduction portion only to infer and the radio station as the transmission object of the transmission data that comprise security information between total a plurality of radio transmit path circumstances, and consider that described a plurality of radio transmits path circumstances and sends the transmission data that comprise security information, can not receive or restore security information so radio transmits other different radio stations of path circumstances.Again, obtain when other radio stations under the situation of security information, must will infer that a plurality of radio transmit path circumstances, more more difficult than inferring that a radio transmits path circumstances.As a result, can more safely transmit security information.
Again, data link of the present invention adopts following structure, promptly, described deduction portion according to described each received signal infer the 1st radio between described radio station and described the 1st acceptance division transmit signal transmission time in the path and the 2nd radio between described radio station and described the 2nd acceptance division transmit in the path signal transmission time and as the described the 1st and the 2nd radio transmission environment, the the described the 1st and the 2nd sending part is in the moment of the delivery time of considering described each signal, described transmission data are sent to described radio station so that described transmission data in advance and the moment that sets between the described radio station arrive described radio station.
According to this structure, sending the radio station of object as security information, because the transmission data that comprise security information are in the predetermined arrival time of reception, so by making synchronous constantly and restituted signal with this, can restore security information.Relative therewith, the radio station beyond the radio station that sends object as security information then can not restore security information.This be because, expression receive and information fiducial time of demodulation zero hour be according to data link only with as a plurality of signal transmission times total between the radio station that sends object and definite, other radio stations can not be known the fiducial time that expression reception and demodulation begin.As a result, other radio stations can not restore security information, can guarantee fail safe.
Again, data link of the present invention adopts following structure, that is, the described the 1st and the 2nd sending part sends and respectively sends data making the 1st and the 2nd to send data and arrive moment of described radio station in the different separately moment.
According to above-mentioned structure, when other radio stations that send object as unclassified information receive security information, the due in that each are different must to be inferred.And this due in is the known moment of radio station that only sends object as security information, so other radio stations can not restore security information.As a result, for example, cut apart security information and distribute to ground 1 respectively and ground 2 sending parts, if make at the above-mentioned different radio stations, the then more difficult recovery security information of other radio stations of constantly arriving.
Again, data link of the present invention adopts following structure, that is, form the described the 1st and the 2nd with identical form and send data, the the described the 1st and the 2nd sending part sends and respectively sends data making the 1st and the 2nd transmission data be carved into the moment that reaches described radio station simultaneously.
According to this structure, the radio station as security information transmission object by the transmission data of synthetic same form, increases received signal level when receiving.As a result, can obtain high-quality security information.Relative therewith, at other radio stations, when receiving, because distinct symbols produces interference each other, signal can produce deterioration.As a result, more difficult acquisition security information.
Again, data link of the present invention adopts following structure, that is, possess in comprising the transmission data of described security information, and described radio station between the pseudo-symbol appendix of additional pseudo-symbol on the predetermined position, described sending part sends the transmission data of having added pseudo-symbol.
According to above-mentioned structure, send the position of the radio station of object as security information, so after receiving demodulation sends data, can easily extract security information out by only removing pseudo-symbol owing to known pseudo-symbol.Relative therewith, other radio stations contingency demodulation send data, owing to have pseudo-symbol, and can not extract security information out.The result can further improve fail safe.
Again, data link of the present invention adopts following structure, promptly possess, in comprising the transmission data of described security information, and described radio station between the additional synchronization sequence signals appendix that has the synchronization sequence signals of synchronized relation mutually on the predetermined position; Additional pseudo-synchronous signal as described synchronization sequence signals, in the pseudo-synchronous signal appendix of the pseudo-synchronization sequence signals that has synchronized relation each other.
According to above-mentioned structure, send the position of the radio station of object as security information, so can easily extract synchronizing signal out owing to known synchronization signal.Radio station can adopt the synchronizing signal of extraction to carry out time synchronized, detected phase change, detect gain variations etc.As a result, improved the quality of reception.Relative therewith, at other radio stations, can not restore security information and can not distinguish pseudo-synchronous signal and synchronizing signal.So, can obtain the data link that fail safe is higher and quality of reception radio station improves.
Again, data link of the present invention adopts following structure, promptly, possesses the pseudo-symbol appendix, described pseudo-symbol appendix is when arranging the described the 1st and the 2nd when sending the unit communication frame of data, respectively send in the data for the very little pseudo-symbol of secret symbols secondary power the described the 1st and the 2nd, so that form the secret symbols phase non-overlapping copies of described security information, the the described the 1st and the 2nd sending part makes the 1st and the 2nd to send the moment that data arrive described radio station simultaneously, sends and respectively sends data.
According to above-mentioned structure, as the radio station of security information transmission object, when receiving the 1st and the 2nd transmission data in the identical moment, because secret symbols can not produce interference each other, so can receive security information in high quality.Relative therewith, send data at other radio stations owing to can not receive the 1st and the 2nd in the identical moment, so secret symbols produces interference each other, security information can produce deterioration.Again, because additional pseudo-symbol, so can not extract security information out.
Again, data link of the present invention adopts following structure, promptly, described deduction portion is except inferring described signal transmission time, also infer the signal power attenuation in the 1st radio transmission path between described radio station and described the 1st acceptance division, the 2nd radio between described radio station and described the 2nd acceptance division transmits the signal power attenuation in the path, the the described the 1st and the 2nd sending part is considering that the described the 1st and the 2nd radio transmits under the transmitted power of the signal power attenuation in the path respectively, and the transmission data that will comprise described security information send to described radio station.
According to above-mentioned structure, the radio station that sends object as security information can obtain incoming level and be suitable for the 1st and the 2nd radio most and transmit path status and move synchronous transmission data down and with receiving from the 1st and the 2nd sending part.As a result, the radio station as security information transmission object can restore security information reliably.Relative therewith, other radio stations are owing to the transmission data that receive on the position different with the radio station that sends object as security information from data link, so be difficult to obtain to be used for the suitable incoming level and the suitable time of reception of this signal of demodulation, so be difficult to restore security information.
Again, data link of the present invention adopts following structure, promptly, form the described the 1st and the 2nd with identical form and send data, the the described the 1st and the 2nd sending part makes the 1st and the 2nd to send the moment that data arrive described radio station simultaneously, sends and respectively sends data, simultaneously according to described signal power attenuation, under the transmitted power of the minimum level that demodulation obtained when described radio station approached synthetic reception and respectively sends data, send described transmission data.
According to above-mentioned structure, send the radio station of object as security information owing to can send the synthetic each other same-sign of data and receive the 1st and the 2nd, thus can obtain to be used for demodulation enough big signal level.Relative therewith, be positioned at and other receiving stations that send the radio station different places of object as security information, can not obtain the necessary signal level of demodulation.As a result, can obtain high-quality security information with respect to the radio station that sends object as security information, and other radio stations can not obtain security information.
Again, data link of the present invention adopts following structure, promptly, described deduction portion is by detecting the wave polarization face that receives according to the received signal that is obtained by described acceptance division, infer that thus described radio transmits path circumstances, described sending part utilization has the transmission ripple of the plane of polarization identical with described deduction portion detected described plane of polarization, sends the transmission data that comprise described security information to described radio station.
According to above-mentioned structure, sending part control sends ripple, so that identical with the plane of polarization of radio station, just can carry out stable communicating by letter so need not adjust transmitter side with the plane of polarization of receiver side.As a result, the radio station that sends object as security information can be under the suitableeest state at the rotatable phase of plane of polarization, the transmission data that comprise security information that reception is sent from sending part.As a result, radio station can obtain high-quality security information.Relative therewith, be positioned at and other radio stations that send the radio station different places of object as security information, because transfer path environment difference, can not make the antenna emission characteristics consistent with the plane of polarization of the transmission data that comprise security information the suitablelyyest, so the quality of reception descends, more difficult recovery security information.
Again, data link of the present invention adopts following structure, promptly, described deduction portion is by detecting the wave polarization face that receives according to the received signal that is obtained by described acceptance division, infer that thus described radio transmits path circumstances, described sending part sends comprise the transmission data of described security information for the transmission ripple stack with plane of polarization identical with described deduction portion detected described plane of polarization after, simultaneously, superpose for transmission ripple and send after the pseudo-data with plane of polarization vertical with described deduction portion detected described plane of polarization.
According to above-mentioned structure, the radio station send object as security information utilizes antenna characteristics can normally receive security information, and does not receive fake information.Thus, do not need to adopt complicated structure, just can easily extract security information out.Relative therewith, at other radio stations, mix ground and receive security information and pseudo-data.Under the poorest situation, only receive pseudo-data again.As a result, can not restore security information.
Again, data link of the present invention adopts following structure, promptly, described deduction portion is by detecting the wave polarization face that receives according to the received signal that is obtained by described acceptance division, infer that thus described radio transmits path circumstances, described sending part make with respect to only be rotated in by the detected described plane of polarization of described deduction portion between the described radio station the transmission ripple of predetermined amount, the transmission data that will comprise described security information send to described radio station.
According to above-mentioned structure, send the radio station of object in unclassified information, can not know data link and rotation information as predetermined plane of polarization between the radio station of security information transmission object.Thus, the plane of polarization of the more difficult deduction transmission data that comprise security information of sending by sending part.As a result, can further improve the fail safe of security information.
Again, data link of the present invention adopts following structure, that is, and and the direction of arrival that described deduction portion also infers described received signal, described sending part is the direction of estimation result after considering described direction of arrival of portion by inference, sends the transmission data that comprise described security information.
According to above-mentioned structure, the transfer path environment for only having between data link and the radio station as security information transmission object by the additional signal direction of arrival, can reduce the danger that security information leaks into other radio stations.
Again, data link of the present invention adopts following structure, that is, described sending part is according to the direction of arrival of being inferred by described deduction portion, direction to described radio station sends the transmission data that comprise described security information, sends pseudo-data to the direction different with described radio station simultaneously.
According to above-mentioned structure, at other radio stations, owing to receive pseudo-data, then more difficult recovery security information.
Again, data link of the present invention adopts following structure, be that described sending part has adaptive array antenna, when transmission comprises the transmission data of described security information, make directive property towards described direction of arrival and to each array antenna weighting, simultaneously, when sending pseudo-data, make directive property outside described direction of arrival direction and to each array antenna weighting.
According to above-mentioned structure, by adopting adaptive array antenna, can be with high accuracy, make directive property towards the direction of arrival of inferring at a high speed.
Again, data link of the present invention adopts following structure, that is, possess: adopt the diffuse code of regulation that described security information is carried out the 1st diffusion part that DIFFUSION TREATMENT also offers thus obtained the 1st diffusion signal described the 1st sending part; Adopt the diffuse code different and fake information is carried out DIFFUSION TREATMENT and thus obtained the 2nd diffusion signal is offered the 2nd diffusion part of described the 2nd sending part for the diffusion gain of the diffusion gain same degree that obtains to bring with described the 1st diffusion part with described diffuse code, the the described the 1st and the 2nd sending part is according to the signal power attenuation of being inferred by described deduction portion, when the described the 1st and the 2nd diffusion signal arrives described radio station, control transmitted power and make the received power value of received power value and described the 2nd diffusion signal of described the 1st diffusion signal produce poor more than certain.
According to above-mentioned structure, the 1st diffusion signal and the 2nd diffusion signal produce each other and disturb and the radio station of arrival conduct transmission object.Then, at this radio station, when for the fake information after security information after the diffusion and the diffusion when carrying out back-diffusion, poor more than producing necessarily between the signal level of the signal level of security information and fake information.Thus, radio station is by the judgment signal level, and security information and fake information and acquisition security information are selected in difference.Relative therewith, at other radio stations that are positioned at above-mentioned radio station diverse location, because radio transmits the path difference, so the difference of the signal level of security information after the back-diffusion and fake information is irregular.As a result, can not distinguish security information and fake information obtains security information, make that the recovery of security information is more difficult.
Again, data link of the present invention adopts following structure, that is, it possesses: the diffuse code that adopts regulation carries out DIFFUSION TREATMENT to described security information and forms the 1st diffusion part of the 1st diffusion signal; Adopt the diffuse code different and fake information is carried out the 2nd diffusion part that DIFFUSION TREATMENT forms the 2nd diffusion signal for the diffusion gain of the diffusion gain same degree that obtains to bring with described the 1st diffusion part with described diffuse code, the the described the 1st and the 2nd sending part is according to the direction of arrival of being inferred by described deduction portion, received power value to the received power value of described the 1st diffusion signal and described the 2nd diffusion signal produces certain above direction that differs from, and sends the described the 1st and the 2nd diffusion signal.
According to above-mentioned structure, the 1st diffusion signal and the 2nd diffusion signal produce each other and disturb and the radio station of arrival conduct transmission object.Then, at this radio station, when for the fake information after security information after the diffusion and the diffusion when carrying out back-diffusion, poor more than producing necessarily between the signal level of the signal level of security information and fake information.Thus, radio station is by the judgment signal level, and security information and fake information and acquisition security information are selected in difference.Relative therewith, at other radio stations that are positioned at above-mentioned radio station diverse location, because radio transmits the path difference, so the difference of the signal level of security information after the back-diffusion and fake information is irregular.As a result, can not distinguish security information and fake information obtains security information, make that the recovery of security information is more difficult.
Again, data link of the present invention adopts following structure, promptly, it possesses the data conversion aligning section of arranging the transmission data that comprise described security information with predetermined conversion in turn between described radio station, and the transmission data after described sending part will be arranged by described exchanges data aligning section conversion send to described radio station.
According to above-mentioned structure, as security information send object radio station since the conversion of given data put in order, so can easily restore security information.Relative therewith, other radio stations are owing to knowing that the conversion of data puts in order, so more difficult recovery security information.
Again, radio communications system of the present invention is to utilize radio to send to the radio communications system of the 2nd radio station from the 1st radio station the transmission data that comprise security information, adopt following structure, that is, described the 1st radio station possesses: the acceptance division that receives the signal that described the 2nd radio station sends; Deduction portion according to the signal transmission time between received signal deduction that obtains by described acceptance division and the described radio station; And for making described transmission data send the sending part of described transmission data in the moment of considering described signal transmission time requiring constantly to arrive described radio station, described the 2nd radio station possesses: the sending part that sends the signal that is used to infer described signal transmission time to described the 1st radio station; Reception comprises the transmission data of described security information and carries out demodulated received portion; And control the reception modulation action of described acceptance division and make with and described the 1st radio station between the predetermined time of reception synchronous reception control part.
According to above-mentioned structure, at the 2nd radio station since the transmission data that comprise security information arrive in the predetermined time of reception, so, can restore security information by making synchronous constantly and restituted signal with this.Relative therewith, at other radio stations, then can not restore security information.This be because, expression receives and information fiducial time of demodulation zero hour is to determine according to signal transmission time total between the 1st radio station only and the 2nd radio station, so other radio stations can not be known the fiducial time of representing reception and demodulation zero hour.As a result, other radio stations can not restore security information, can guarantee fail safe.
Again, radio communications system of the present invention adopts following structure, promptly, described the 1st radio station is in comprising the data of described security information, and add on the predetermined position between the described radio station and have the synchronization sequence signals of synchronized relation mutually, simultaneously, additional pseudo-synchronous signal as described synchronization sequence signals, the pseudo-synchronization sequence signals that has synchronized relation mutually, described the 2nd radio station is being the described predetermined time of reception that benchmark is extracted described synchronization sequence signals out, according to described synchronization sequence signals, proofread and correct the transmission data that comprise described security information that receive.
According to above-mentioned structure, the 2nd radio station is owing to the position of known synchronization signal, so can easily extract synchronizing signal out.Again, the 2nd radio station synchronizing signal of adopt extracting out can be carried out the correction of time synchronized and phase place change, gain variations.As a result, can improve the quality of reception.Relative therewith, at other radio stations, can not restore security information, can not distinguish pseudo-synchronous signal and synchronizing signal.So, can obtain the radio communications system of the quality of reception raising of safe and radio station.
Again, radio communications system of the present invention adopts following structure, promptly, described the 1st radio station described transmission data from and described the 2nd radio station between moment of reaching moment of only being offset the stipulated time predefined described time of reception, send described transmission data, the described transmission data that described the 2nd radio station arrives for the stipulated time skew adopt described synchronization sequence signals to carry out Synchronous Processing and the described transmission data of demodulation.
According to this structure, in other receiving stations, more difficult recovery security information.Again, send dispatching station and the receiving station that receives,, also can restore security information, so the degree of freedom of design increases even security information does not just in time arrive in the predefined time of reception in security information.
Again, radio communications system of the present invention adopts following structure, promptly, the side-play amount of described the 1st radio station and described stipulated time sends described security information relatively, described the 2nd radio station with the side-play amount of described stipulated time as the identifying information of described security information and utilize and carry out demodulation process.
According to above-mentioned structure, can further reduce the danger that security information is leaked into other radio stations.
Again, radio communications system of the present invention adopts following structure, that is, described the 2nd radio station has: to be the configuration part, hunting zone that benchmark is set the hunting zone of regulation the described time of reception; The peak value of the described received signal of search in the scope of setting by configuration part, described hunting zone and extract the synchronization sequence signals extraction unit of described synchronization sequence signals thus out; And the correction unit of proofreading and correct transmission data that receive, that comprise described security information according to the synchronization sequence signals of extracting out.
According to above-mentioned structure, in the configuration part, hunting zone, set that the 2nd radio station only can be known, be the hunting zone of the narrow time width at center with the time of reception, can extract synchronization sequence signals reliably out as the benchmark of the correction of the correction of time synchronized, phase place change and gain variations.As a result, the 2nd radio station can obtain high-quality security information.Relative therewith, owing to there is pseudo-synchronization sequence signals with the synchronization sequence signals same level, so other receiving stations can not other synchronization sequence signals and pseudo-synchronization sequence signals, so be difficult to carry out time synchronized, the correction of phase place change and the correction of gain, the recovery of security information becomes more difficult.
Again, radio communications system of the present invention is to utilize radio to send to the radio communications system of the 2nd radio station from the 1st radio station the transmission data that comprise security information, and adopt following structure, that is, described the 1st radio station has: the acceptance division that receives the signal of being sent by described the 2nd radio station; Detect the plane of polarization test section of trusted wave polarization face according to the received signal that obtains by described the 1st radio station; And utilize make described plane of polarization relatively and detected plane of polarization only rotate the transmission ripple of predetermined amount between the described the 1st and the 2nd radio station and the transmission data that will comprise described security information send to the sending part of described the 2nd radio station, described the 2nd radio station is exported the signal that described plane of polarization detects usefulness to described the 1st radio station, simultaneously, till exporting signal that described plane of polarization detects usefulness and beginning to comprise the transmission data of described security information to reception, make the plane of polarization characteristic of antenna only rotate predetermined amount between the described the 1st and the 2nd radio station, the plane of polarization characteristic of described antenna is meant what described the 1st radio station of reception sent, the plane of polarization characteristic of antenna that comprises the transmission data of described security information.
According to above-mentioned structure, at other radio stations, owing to can not know the rotation information of the plane of polarization that is predetermined between the 1st radio station and the 2nd radio station.Therefore, be difficult to infer the plane of polarization of the transmission data that comprise security information of sending from the 1st radio station at other radio stations.As a result, other radio stations are difficult to receive and restore security information.
Again, radio communications system of the present invention adopts following structure, that is, the described the 1st and the 2nd radio station makes plane of polarization only rotate the processing of the amount that is predetermined between the described the 1st and the 2nd radio station with predetermined interval between the described the 1st and the 2nd radio station repeatedly.
According to above-mentioned structure, at other radio stations, the plane of polarization of the transmission data that comprise security information that more difficult deduction is sent from the 1st radio station.As a result, more difficult reception of other radio stations and recovery security information.
Again, radio communications system of the present invention is to utilize radio to send to the radio communications system of the 2nd radio station from the 1st radio station the transmission data that comprise security information, it adopts following structure, that is, described the 1st radio station has: infer that according to the signal that sends from described the 2nd radio station radio transmits the deduction portion of time and signal power attenuation; Diffusion part, adopt the diffuse code of regulation that described security information is carried out DIFFUSION TREATMENT and formed the 1st diffusion signal, adopt the diffusion symbol different that fake information is carried out DIFFUSION TREATMENT simultaneously and gain with the diffusion of the identical size of described the 1st diffusion signal so that obtain with described diffuse code; And sending part, according to infer the signal power attenuation that obtains control transmitted power and send the described the 1st and the 2nd diffusion signal when the described the 1st and the 2nd diffusion signal arrives described the 2nd radio station by described deduction portion, and so that the received power value of the received power value of described the 1st diffusion signal and described the 2nd diffusion signal produces certain above poorly, described the 2nd radio station possesses: the back-diffusion portion that the described the 1st and the 2nd diffusion signal is carried out back-diffusion; And the security information extraction unit of extracting described security information according to the signal level of the signal after the back-diffusion out.
According to above-mentioned structure, at the 2nd radio station, when for the fake information after security information after the diffusion and the diffusion when carrying out back-diffusion, poor more than producing necessarily between the signal level of the signal level of security information and fake information.Thus, the 2nd radio station is by the judgment signal level, and security information and fake information and acquisition security information are selected in difference.Relative therewith, at other radio stations that are positioned at the 2nd radio station diverse location, because radio transmits the path difference, so the difference of the signal level of security information after the back-diffusion and fake information is irregular.As a result, can not distinguish security information and fake information obtains security information, make that the recovery of security information is more difficult.
Again, radio communications system of the present invention is to utilize radio to send to the radio communications system of the 2nd radio station from the 1st radio station the transmission data that comprise security information, it adopts following structure, that is, described the 1st radio station has: infer that according to the signal that sends from described the 2nd radio station radio transmits the deduction portion of time and signal direction of arrival; Diffusion part, described diffusion part adopts the diffuse code of regulation that described security information is carried out DIFFUSION TREATMENT and formed the 1st diffusion signal, adopts the diffusion symbol different with described diffuse code that fake information is carried out DIFFUSION TREATMENT simultaneously and gains with the diffusion of the identical size of described the 1st diffusion signal so that obtain; And sending part, described sending part is according to being inferred that by described deduction portion the direction of arrival that obtains is when the described the 1st and the 2nd diffusion signal arrives described the 2nd radio station, the direction that produces the difference more than certain to the received power value of the received power value of described the 1st diffusion signal and described the 2nd diffusion signal sends the described the 1st and the 2nd diffusion signal, and described the 2nd radio station possesses: the back-diffusion portion that the described the 1st and the 2nd diffusion signal is carried out back-diffusion; And the security information extraction unit of extracting described security information according to the signal level of the signal after the back-diffusion out.
According to above-mentioned structure, at the 2nd radio station, when for the fake information after security information after the diffusion and the diffusion when carrying out back-diffusion, poor more than producing necessarily between the signal level of the signal level of security information and fake information.Thus, the 2nd radio station is by the judgment signal level, and security information and fake information and acquisition security information are selected in difference.Relative therewith, at other radio stations that are positioned at the 2nd radio station diverse location, because radio transmits the path difference, so the difference of the signal level of security information after the back-diffusion and fake information is irregular.As a result, can not distinguish security information and fake information obtains security information, make that the recovery of security information is more difficult.
Again, radio communications system of the present invention is to utilize radio to send to the radio communications system of the 3rd radio station from the 1st and the 2nd radio station the transmission data that comprise security information, it adopts following structure, that is, the described the 1st and the 2nd radio station possesses respectively: the network connecting portion that is connected and obtains from this network described security information with cable network; The acceptance division of the signal that reception is sent by described the 3rd radio station; Deduction portion according to the signal transmission time between received signal deduction that obtains by described acceptance division and described the 3rd radio station; And send described transmission data and make described transmission data arrive the sending part of described the 3rd radio station in the desired moment in the moment of considering described signal transmission time, described the 3rd radio station possesses: the sending part that sends the signal that is used to infer described signal transmission time to described the 1st radio station; Reception comprises the transmission data of described security information and carries out demodulated received portion; And control the receiving demodulation action of described acceptance division and make and the described the 1st and the 2nd radio station between the predefined time of reception synchronous reception control part.
According to above-mentioned structure, the 1st and the 2nd radio station obtains security information by the network connecting portion from cable network.Then, for example, if the security information that obtains shared by the 1st radio station and the 2nd radio station and send to the 3rd radio station, then the 3rd radio station after receiving these and cutting apart security information and they are synthesized, thus, can restore security information.Relative therewith, other radio stations are owing to knowing the time of reception, so can not restore security information.Again, even for example obtain a side the time of reception, owing to cut apart security information, so can not fully restore security information.
Again, radio communication method of the present invention is to utilize radio to send to the radio communication method of the 2nd radio station from the 1st radio station the transmission data that comprise security information, send signal from described the 2nd radio station to described the 1st radio station, described the 1st radio station is according to the signal that receives, infer the signal transmission time between the described the 1st and the 2nd radio station, described the 1st radio station sends the transmission data that comprise described security information in the moment of considering described signal transmission time, so that described transmission data arrive described radio station in the time of reception that requires.
According to this method, at the 2nd radio station, owing to the transmission data that comprise security information arrived in the predetermined time of reception, so, can restore security information by making synchronous constantly and restituted signal with this.Relative therewith, at other radio stations, then can not restore security information.This is because expression receives and information fiducial time of demodulation zero hour is according to signal transmission time decision total between the 1st radio station only and the 2nd radio station, so other radio stations can not be known the fiducial time of representing reception and demodulation zero hour.As a result, other radio stations can not restore security information, thus, have guaranteed fail safe.
Again, in communication means of the present invention, be meant the described desired time of reception, before comprising the transmission data of described security information from described the 1st radio station transmission, according between the described the 1st and the 2nd radio station at least by once back and forth sending the described delivery time that received signal is inferred, the moment that between the described the 1st and the 2nd radio station, sets.
According to this method, signal transmission time fully becomes only the 1st radio station and the total information of the 2nd radio station, so other radio stations can not be known this temporal information.As a result, other radio stations can not be known security information.
Again, radio telecommunication method of the present invention be in comprising the transmission data of described security information, and described radio station between on the position that is predetermined, additional pseudo-symbol.
According to this method, the 2nd radio station is owing to the position of known pseudo-symbol, so after receiving demodulation sends data, can easily extract security information out by only removing pseudo-symbol.Relative therewith, even other radio stations are just in case demodulation has obtained the transmission data, owing to have pseudo-symbol, so can not extract security information out.
Again, radio communication method of the present invention be in comprising the transmission data of described security information, and described radio station between on the position that is predetermined, additional have the synchronization sequence signals of synchronized relation mutually and additionally simultaneously have the pseudo-synchronization sequence signals of synchronized relation mutually.
According to this method, the 2nd radio station is owing to the position of known synchronization signal, so can easily extract synchronizing signal out.The 2nd radio station adopts the synchronizing signal of extracting out to carry out time synchronized, the correction of phase place change, the correction of gain variations etc.As a result, can improve the quality of reception.Relative therewith, at other radio stations, can not restore security information, can not distinguish pseudo-synchronous signal and synchronizing signal.So, the quality of reception of fail safe raising and the 2nd radio station improves.
As mentioned above, data link of the present invention, radio communications system and radio communication method from the 1st radio station when the 2nd radio station radio transmitting comprises the transmission data of security information, before transmitting this security information, receive by the transmission of between the 1st radio station and the 2nd radio station, carrying out signal, infer only total radio transmission path between the 1st radio station and the 2nd radio station, consider deduction radio transmit the path and send security information to the 2nd radio station from the 1st radio station, thus, when by radio link when specific radio station transmits security information, can under tight security, transmit security information.
This specification is the Japanese patent application 2000-260413 that proposes according to August 30 in 2000.Its content is included in this specification.
Industrial applicability
The present invention can be applicable to the occasion that sends security information by the radio circuit to the specific wireless power station.

Claims (29)

1. data link, it is the data link that the transmission data of utilizing radio will comprise security information are sent to radio station, it is characterized in that possessing
The receiving-member of the signal that reception is sent by described radio station; Transmit the deduction parts of environment as radio according to the signal transmission time between received signal deduction that obtains by described receiving-member and the described radio station; Send described transmission data in the moment of considering described signal transmission time, so that described transmission data arrive the transmit block of described radio station in the desired time of reception; In comprising the transmission data of described security information, and described radio station between the pseudo-symbol optional feature of additional pseudo-symbol on the predetermined position, the transmission data that described transmit block will have been added pseudo-symbol send to described radio station.
2. data link, it is the data link that the transmission data of utilizing radio will comprise security information are sent to radio station, it is characterized in that possessing
The receiving-member of the signal that reception is sent by described radio station; Transmit the deduction parts of environment as radio according to the signal transmission time between received signal deduction that obtains by described receiving-member and the described radio station; Send described transmission data in the moment of considering described signal transmission time, so that described transmission data arrive the transmit block of described radio station in the desired time of reception; In comprising the transmission data of described security information, and described radio station between the additional synchronizing signal optional feature that has the synchronization sequence signals of synchronized relation mutually on the predetermined position; Additional pseudo-synchronous signal as described synchronization sequence signals, at the pseudo-synchronous signal optional feature of the pseudo-synchronization sequence signals that has synchronized relation each other.
3. data link, it is the data link that is sent to radio station by the transmission data that radio will comprise security information, it is characterized in that possessing
Be configured in mutually different locational, the 1st and the 2nd receiving-member that receives the signal that sends by described radio station; Infer that according to the received signal that obtains by described the 1st receiving-member the 1st radio between described the 1st receiving-member and the described radio station transmits path circumstances, infers that according to the received signal of described the 2nd receiving-member acquisition the 2nd radio between described the 2nd receiving-member and the described radio station transmits the deduction parts of path circumstances simultaneously; Be configured in respectively with the described the 1st and the 2nd receiving-member same position on, the described the 1st and the 2nd radio that obtained by described deduction parts of the research transmission data that transmit path circumstances and will comprise described security information send to the 1st and the 2nd transmit block of described radio station.
4. data link as claimed in claim 3 is characterized in that,
Described deduction parts infer that according to described each received signal signal transmission time and the signal transmission time in the transmission of the 2nd radio between described radio station and described the 2nd receiving-member path that the 1st radio between described radio station and described the 1st receiving-member transmits in the path are the described the 1st and the 2nd radio transmission environment, the the described the 1st and the 2nd transmit block is in the moment of the delivery time of considering described each signal, described transmission data are sent to described radio station so that described transmission data in advance and the moment of setting between the described radio station arrive described radio station.
5. data link as claimed in claim 4 is characterized in that,
The the described the 1st and the 2nd transmit block sends and respectively sends data making the 1st and the 2nd to send data and arrive moment of described radio station in the different separately moment.
6. data link as claimed in claim 4 is characterized in that,
The the described the 1st and the 2nd sends data forms with identical form, and the described the 1st and the 2nd transmit block sends and respectively sends data making the 1st and the 2nd to send data and arrive moment of described radio station in the identical moment.
7. data link as claimed in claim 4 is characterized in that,
Possess in comprising the transmission data of described security information, and described radio station between the pseudo-symbol optional feature of additional pseudo-symbol on the predetermined position, described transmit block sends the transmission data of having added pseudo-symbol to described radio station.
8. data link as claimed in claim 4 is characterized in that possessing
In comprising the transmission data of described security information, and described radio station between the additional synchronizing signal optional feature that has the synchronization sequence signals of synchronized relation mutually on the predetermined position; Additional pseudo-synchronous signal as described synchronization sequence signals, at the pseudo-synchronous signal optional feature of the pseudo-synchronization sequence signals that has synchronized relation each other.
9. data link as claimed in claim 4 is characterized in that,
Possesses the pseudo-symbol optional feature, described pseudo-symbol optional feature is arranging the described the 1st and the 2nd when sending the unit communication frame of data, respectively send in the data for the very little pseudo-symbol of secret symbols secondary power the described the 1st and the 2nd, so that form the secret symbols phase non-overlapping copies of described security information, the the described the 1st and the 2nd transmit block makes the 1st and the 2nd to send the moment that data arrive described radio station simultaneously, sends and respectively sends data.
10. data link as claimed in claim 4 is characterized in that,
Described deduction parts are except inferring described signal transmission time, also infer the signal power attenuation in the 2nd radio transmission path between signal power attenuation, described radio station and described the 2nd receiving-member in the 1st radio transmission path between described radio station and described the 1st receiving-member, to consider that the described the 1st and the 2nd radio transmits the transmitted power of the signal power attenuation in the path, the transmission data that will comprise described security information send to described radio station to the described the 1st and the 2nd transmit block respectively.
11. data link as claimed in claim 10 is characterized in that,
The the described the 1st and the 2nd sends data forms with identical form, the the described the 1st and the 2nd transmit block sends the moment that data arrive described radio station simultaneously the 1st and the 2nd, send and respectively send data, simultaneously according to described signal power attenuation, the transmitted power of minimum level that can demodulation when described radio station respectively sends data to approach synthetic reception sends described transmission data.
12. a data link, it is the data link that the transmission data of utilizing radio will comprise security information are sent to radio station, it is characterized in that possessing
The receiving-member of the signal that reception is sent by described radio station; Transmit the deduction parts of environment according to the radio between received signal deduction that obtains by described receiving-member and the described radio station; The transmission data that the radio that research is obtained by described deduction parts transmits path circumstances and will comprise described security information send to the transmit block of described radio station, described deduction parts are by detecting the wave polarization face that receives according to the received signal that is obtained by described receiving-member, infer that described radio transmits path circumstances, described transmit block utilization has the transmission ripple of the plane of polarization identical with the detected described plane of polarization of described deduction parts, sends the transmission data that comprise described security information to described radio station.
13. a data link, it is the data link that the transmission data of utilizing radio will comprise security information are sent to radio station, it is characterized in that possessing
The receiving-member of the signal that reception is sent by described radio station; Transmit the deduction parts of environment according to the radio between received signal deduction that obtains by described receiving-member and the described radio station; The transmission data that the radio that research is obtained by described deduction parts transmits path circumstances and will comprise described security information send to the transmit block of described radio station, described transmit block is by detecting the wave polarization face that receives according to the received signal that is obtained by described receiving-member, infer that described radio transmits path circumstances, described transmit block sends for the transmission data that the transmission ripple stack with plane of polarization identical with the detected described plane of polarization of described deduction parts comprises described security information afterwards, simultaneously, superpose for transmission ripple and send after the pseudo-data with plane of polarization vertical with the detected described plane of polarization of described deduction parts.
14. a data link, it is the data link that the transmission data of utilizing radio will comprise security information are sent to radio station, it is characterized in that possessing
The receiving-member of the signal that reception is sent by described radio station; Transmit the deduction parts of environment according to the radio between received signal deduction that obtains by described receiving-member and the described radio station; The transmission data that the radio that research is obtained by described deduction parts transmits path circumstances and will comprise described security information send to the transmit block of described radio station, described deduction parts are by detecting the wave polarization face that receives according to the received signal that is obtained by described receiving-member, infer that described radio transmits path circumstances, described transmit block utilization is with respect to by the detected described plane of polarization of described deduction parts, only make described plane of polarization be rotated in the transmission ripple of predetermined amount between the described radio station, the transmission data that will comprise described security information send to described radio station.
15. a data link, it is the data link that the transmission data of utilizing radio will comprise security information are sent to radio station, it is characterized in that possessing
The receiving-member of the signal that reception is sent by described radio station; According to the deduction parts that transmit environment between received signal deduction that obtains by described receiving-member and the described radio station as described radio; Send described transmission data in the moment of considering described signal transmission time, so that described transmission data arrive the transmit block of described radio station in the desired time of reception; Described deduction parts are also inferred the direction of arrival of described received signal, described transmit block is according to the direction of arrival of being inferred by described deduction parts, direction to described radio station sends the transmission data that comprise described security information, sends pseudo-data to the direction different with described radio station simultaneously.
16. data link as claimed in claim 15 is characterized in that,
Described transmit block has the adaptive arrays antenna, when transmission comprises the transmission data of described security information, to each array antenna weighting, make directive property towards described direction of arrival, simultaneously, when sending pseudo-data, each array antenna weighting is made the direction of directive property outside described direction of arrival.
17. data link as claimed in claim 10 is characterized in that,
Possess: adopt the diffuse code of regulation that described security information is carried out the 1st proliferation part that DIFFUSION TREATMENT also offers thus obtained the 1st diffusion signal described the 1st transmit block; And the employing diffuse code different with described diffuse code, and fake information is carried out the diffusion gain of DIFFUSION TREATMENT with the diffusion gain same degree that obtains to bring with described the 1st proliferation part, and thus obtained the 2nd diffusion signal is offered the 2nd proliferation part of described the 2nd transmit block
The the described the 1st and the 2nd transmit block is according to the signal power attenuation of being inferred by described deduction parts, when the described the 1st and the 2nd diffusion signal arrived described radio station, the control transmitted power was so that the received power value of the received power value of described the 1st diffusion signal and described the 2nd diffusion signal produces poor more than the certain value.
18. data link as claimed in claim 15 is characterized in that,
Possess: adopt the diffuse code of regulation that described security information is carried out DIFFUSION TREATMENT, form the 1st proliferation part of the 1st diffusion signal with this; Adopt the diffuse code different, fake information is carried out DIFFUSION TREATMENT with described diffuse code.Diffusion gain with the diffusion gain same degree that obtains to bring with described the 1st proliferation part forms the 2nd proliferation part of the 2nd diffusion signal with this,
The the described the 1st and the 2nd transmit block is according to the direction of arrival of being inferred by described deduction parts, produce the direction of the difference more than the certain value to the received power value of the received power value of described the 1st diffusion signal and described the 2nd diffusion signal, send the described the 1st and the 2nd diffusion signal.
19. a radio communications system, it is to utilize radio to send to the radio communications system of the 2nd radio station from the 1st radio station the transmission data that comprise security information, it is characterized in that,
Described the 1st radio station possesses: the receiving-member that receives the signal that described the 2nd radio station sends; Deduction parts according to the signal transmission time between received signal deduction that obtains by described receiving-member and the described radio station; And, send described transmission data so that described transmission data arrive the transmit block of described radio station in the time of reception that requires in the moment of considering described signal transmission time, described the 2nd radio station possesses: the transmit block that sends the signal that is used to infer described signal transmission time to described the 1st radio station; Reception comprises the transmission data of described security information and carries out the demodulated received parts; And the reception modulation action of controlling described receiving-member so that with and described the 1st radio station between the predetermined time of reception synchronous reception control assembly,
Described the 1st radio station in comprising the data of described security information, and described the 2nd radio station between additionally on the predetermined position have the synchronization sequence signals of synchronized relation mutually, simultaneously, additional pseudo-synchronous signal as described synchronization sequence signals, have a pseudo-synchronization sequence signals of synchronized relation mutually, described the 2nd radio station is being the described predetermined time of reception that benchmark is extracted described synchronization sequence signals out, according to described synchronization sequence signals, proofread and correct transmission data that receive, that comprise described security information.
20. radio communications system as claimed in claim 19 is characterized in that,
Described the 1st radio station described transmission data departing from and described the 2nd radio station between moment of arriving in moment of the predefined described stipulated time time of reception send described transmission data, described the 2nd radio station utilizes described synchronization sequence signals to carry out Synchronous Processing and described transmission data is carried out demodulation for departing from described transmission data that the stipulated time arrives.
21. radio communications system as claimed in claim 20 is characterized in that,
The side-play amount of described the 1st radio station and described stipulated time sends described security information relatively, and described the 2nd radio station carries out demodulation process with the side-play amount of described stipulated time as the identifying information use of described security information.
22. radio communications system as claimed in claim 19 is characterized in that,
Described the 2nd radio station has: to be the hunting zone set parts that benchmark is set the hunting zone of regulation the described time of reception; The peak value of the described received signal of search in the scope of being set by described hunting zone set parts is extracted parts out with this synchronization sequence signals of extracting described synchronizing signal out; And the correcting unit of proofreading and correct transmission data that receive, that comprise described security information according to the synchronization sequence signals of extracting out.
23. a radio communications system, it is to utilize radio to send to the radio communications system of the 2nd radio station from the 1st radio station the transmission data that comprise security information, it is characterized in that,
Described the 1st radio station has: the receiving-member that receives the signal of being sent by described the 2nd radio station; Detect the plane of polarization detection part of collection of letters wave polarization face according to the received signal that obtains by described receiving-member; And utilization makes described plane of polarization rotate the transmission ripple of predetermined amount between the described the 1st and the 2nd radio station with respect to detected plane of polarization, the transmission data that will comprise described security information send to the transmit block of described the 2nd radio station, described the 2nd radio station is exported the signal that described plane of polarization detects usefulness to described the 1st radio station, simultaneously, begin to comprise time quantum till the transmission data of described security information from exporting signal that described plane of polarization detects usefulness to reception, make the plane of polarization characteristic of antenna rotate predetermined amount between the described the 1st and the 2nd radio station, the plane of polarization characteristic of described antenna is meant what described the 1st radio station of reception sent, the plane of polarization characteristic of the antenna of the described transmission data comprise information of maintaining secrecy.
24. radio communications system as claimed in claim 23 is characterized in that,
The the described the 1st and the 2nd radio station makes plane of polarization rotate the processing of the amount that is predetermined between the described the 1st and the 2nd radio station with predetermined interval between the described the 1st and the 2nd radio station repeatedly.
25. a radio communications system, it is to utilize radio to send to the radio communications system of the 2nd radio station from the 1st radio station the transmission data that comprise security information, it is characterized in that,
Described the 1st radio station has: infer that according to the signal that sends from described the 2nd radio station radio transmits the deduction parts of time and signal power attenuation; Proliferation part, adopt the diffuse code of regulation that described security information is carried out DIFFUSION TREATMENT and formed the 1st diffusion signal, adopt the diffusion symbol different that fake information is carried out DIFFUSION TREATMENT simultaneously with described diffuse code, gain with the gain diffusion of identical size of the diffusion of described the 1st diffusion signal obtaining, form the 2nd diffusion signal thus; And transmit block, according to the signal power attenuation of inferring by described deduction parts, the control transmitted power makes poor more than the received power value generation certain value of received power value and described the 2nd diffusion signal of described the 1st diffusion signal when the described the 1st and the 2nd diffusion signal arrives described the 2nd radio station, and send the described the 1st and the 2nd diffusion signal, described the 2nd radio station possesses: the back-diffusion parts that make the described the 1st and the 2nd diffusion signal back-diffusion; And the security information extraction parts of extracting described security information according to the signal level of the signal after the back-diffusion out.
26. a radio communications system, it is to utilize radio to send to the radio communications system of the 2nd radio station from the 1st radio station the transmission data that comprise security information, it is characterized in that,
Described the 1st radio station has: infer that according to the signal that sends from described the 2nd radio station radio transmits the deduction parts of time and signal direction of arrival; Proliferation part, described proliferation part adopts the diffuse code of regulation that described security information is carried out DIFFUSION TREATMENT and formed the 1st diffusion signal, adopt simultaneously the diffuse code different with described diffuse code and to fake information carry out DIFFUSION TREATMENT with obtain with described the 1st diffusion signal the diffusion of the identical size of gain gain, form the 2nd diffusion signal thus; And transmit block, described transmit block is according to being inferred that by described deduction parts the direction of arrival that obtains is when the described the 1st and the 2nd diffusion signal arrives described the 2nd radio station, the direction that produces the difference more than the certain value to the received power value of the received power value of described the 1st diffusion signal and described the 2nd diffusion signal sends the described the 1st and the 2nd diffusion signal, and described the 2nd radio station possesses: the back-diffusion parts that make the described the 1st and the 2nd diffusion signal back-diffusion; And the security information extraction parts of extracting described security information according to the signal level of the signal after the back-diffusion out.
27. a radio communications system, it is to utilize radio to send to the radio communications system of the 3rd radio station from the 1st and the 2nd radio station the transmission data that comprise security information, it is characterized in that,
The the described the 1st and the 2nd radio station possesses respectively: be connected with cable network and obtain the network link that described security information is used from this network; The receiving-member of the signal that reception is sent by described the 3rd radio station; Deduction parts according to the signal transmission time between received signal deduction that obtains by described receiving-member and described the 3rd radio station; And send described transmission data in the moment of considering described signal transmission time, make described transmission data arrive the transmit block of described the 3rd radio station in the desired moment, described the 3rd radio station possesses: the transmit block that sends the signal that is used to infer described signal transmission time to described the 1st radio station; Reception comprises the transmission data of described security information and carries out the demodulated received parts; And control the receiving demodulation action of described receiving-member and make and the described the 1st and the 2nd radio station between the predefined time of reception synchronous reception control assembly.
28. a radio communication method, it is to utilize radio to send to the radio communication method of the 2nd radio station from the 1st radio station the transmission data that comprise security information, it is characterized in that,
Send signal from described the 2nd radio station to described the 1st radio station, described the 1st radio station is according to the signal that receives, infer the signal transmission time between the described the 1st and the 2nd radio station, described the 1st radio station sends the transmission data that comprise described security information in the moment of considering described signal transmission time, so that described transmission data arrive described radio station in the time of reception that requires, and
In comprising the transmission data of described security information, and described radio station between on the position that is predetermined, additional pseudo-symbol.
29. a radio communication method, it is to utilize radio to send to the radio communication method of the 2nd radio station from the 1st radio station the transmission data that comprise security information, it is characterized in that,
Send signal from described the 2nd radio station to described the 1st radio station, described the 1st radio station is according to the signal that receives, infer the signal transmission time between the described the 1st and the 2nd radio station, described the 1st radio station sends the transmission data that comprise described security information in the moment of considering described signal transmission time, so that described transmission data arrive described radio station in the time of reception that requires, and in described transmission data, and described radio station between on the position that is predetermined, additional have the synchronization sequence signals of synchronized relation mutually, and additional simultaneously have the pseudo-synchronization sequence signals of synchronized relation mutually.
CN01803405.5A 2000-08-30 2001-08-30 Data transmitting apparatus, radio communication system and radio communication method Expired - Fee Related CN1276595C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2000260413 2000-08-30
JP260413/00 2000-08-30
JP260413/2000 2000-08-30

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN200610126151.7A Division CN1913395A (en) 2000-08-30 2001-08-30 Data transmitting device, and system and method for radio communication

Publications (2)

Publication Number Publication Date
CN1394399A CN1394399A (en) 2003-01-29
CN1276595C true CN1276595C (en) 2006-09-20

Family

ID=18748428

Family Applications (2)

Application Number Title Priority Date Filing Date
CN200610126151.7A Pending CN1913395A (en) 2000-08-30 2001-08-30 Data transmitting device, and system and method for radio communication
CN01803405.5A Expired - Fee Related CN1276595C (en) 2000-08-30 2001-08-30 Data transmitting apparatus, radio communication system and radio communication method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN200610126151.7A Pending CN1913395A (en) 2000-08-30 2001-08-30 Data transmitting device, and system and method for radio communication

Country Status (4)

Country Link
US (1) US20020181439A1 (en)
EP (1) EP1233547A4 (en)
CN (2) CN1913395A (en)
WO (1) WO2002019569A1 (en)

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DK1076486T3 (en) * 1998-05-05 2006-01-09 Pharma Mar Sa Cultivation of sessile marine animals
US7224942B2 (en) * 2001-07-26 2007-05-29 Telefonaktiebolaget Lm Ericsson (Publ) Communications system employing non-polluting pilot codes
JP2005520139A (en) * 2002-03-08 2005-07-07 エクストリームスペクトラム,インコーポレイテッド Method and system for performing a distance measurement function in an ultra-wideband system
EP1557941A4 (en) * 2002-11-01 2012-06-13 Panasonic Corp Filter circuit and radio device
JP4083746B2 (en) * 2002-12-19 2008-04-30 富士通株式会社 OFDM receiver
US7352688B1 (en) 2002-12-31 2008-04-01 Cisco Technology, Inc. High data rate wireless bridging
SE525794C2 (en) * 2003-07-11 2005-04-26 Infineon Technologies Ag Procedure and system for transmitting secret data in a communication network
JP2005110228A (en) * 2003-09-10 2005-04-21 Matsushita Electric Ind Co Ltd Secure communication method, transmitting device, and receiving device
JP4318529B2 (en) * 2003-10-24 2009-08-26 富士通株式会社 Communications system
FR2866507B1 (en) * 2004-02-16 2006-05-05 Wavecom CELL RADIOTELEPHONY SIGNAL FOR SYNCHRONIZATION AT THE SUBFRAME LEVEL OF AN ADDITIONAL CHANNEL USING A MAIN CHANNEL, METHOD, MOBILE AND CORRESPONDING BASE STATION.
EP1758292A4 (en) * 2004-07-29 2011-10-12 Panasonic Corp Wireless communication apparatus and wireless communication method
US7512237B1 (en) * 2004-10-26 2009-03-31 Lockheed Martin Corporation Encryption for optical communications using dynamic subcarrier multiplexing
EP1670181B1 (en) * 2004-12-10 2008-06-04 Canon Kabushiki Kaisha Communication apparatus and communication timing control method
EP1679919B1 (en) * 2005-01-05 2008-01-30 Tektronix International Sales GmbH Method and apparatus for monitoring an interface arranged between a first and a second node of a transmission system
EP1826940B1 (en) * 2005-01-12 2012-11-28 Panasonic Corporation Wireless communication method, base station apparatus and mobile station apparatus
US7489944B2 (en) * 2005-06-01 2009-02-10 Alcatel-Lucent Usa Inc. Method of allocating power over channels of a communication system
US8447234B2 (en) 2006-01-18 2013-05-21 Qualcomm Incorporated Method and system for powering an electronic device via a wireless link
US9130602B2 (en) 2006-01-18 2015-09-08 Qualcomm Incorporated Method and apparatus for delivering energy to an electrical or electronic device via a wireless link
US9774086B2 (en) 2007-03-02 2017-09-26 Qualcomm Incorporated Wireless power apparatus and methods
US8482157B2 (en) 2007-03-02 2013-07-09 Qualcomm Incorporated Increasing the Q factor of a resonator
US9124120B2 (en) 2007-06-11 2015-09-01 Qualcomm Incorporated Wireless power system and proximity effects
US8629576B2 (en) 2008-03-28 2014-01-14 Qualcomm Incorporated Tuning and gain control in electro-magnetic power systems
US9596019B2 (en) * 2008-05-28 2017-03-14 Telefonaktiebolaget Lm Ericsson (Publ) Polarization co-ordination
US8462875B2 (en) * 2009-07-20 2013-06-11 Mitsubishi Electric Corporation Timing regenerating device
US8626214B2 (en) * 2010-06-22 2014-01-07 Alcatel Lucent Method of cancelling interference in sounding reference signals
GB201010735D0 (en) * 2010-06-25 2010-08-11 Omar Ralph M Security improvements for flexible substrates
CN101902265A (en) * 2010-07-22 2010-12-01 西安交通大学 Safe transmission method of physical layer in wireless communication
DE102010046469A1 (en) 2010-09-24 2012-03-29 Gm Global Technology Operations Llc (N.D.Ges.D. Staates Delaware) Transmitting device, receiving device, communication system and method for operating a transmitting device and a receiving device
EP2525533B1 (en) * 2011-05-16 2014-02-26 Alcatel Lucent Method and apparatus for providing bidirectional communication between segments of a home network
US9094309B2 (en) * 2012-03-13 2015-07-28 International Business Machines Corporation Detecting transparent network communication interception appliances
KR102060496B1 (en) * 2013-02-12 2019-12-30 삼성전자주식회사 Terminal apparatus and method for time synchronization
US9601267B2 (en) 2013-07-03 2017-03-21 Qualcomm Incorporated Wireless power transmitter with a plurality of magnetic oscillators
US10142216B2 (en) * 2013-08-29 2018-11-27 Lantiq Deutschland Gmbh Power saving in communication systems
JP5986323B2 (en) * 2013-10-18 2016-09-06 株式会社日立製作所 Highly secure wireless communication system
JP6280993B2 (en) * 2014-11-13 2018-02-14 株式会社日立製作所 Wireless communication system and system for using the same
JP6228108B2 (en) * 2014-12-18 2017-11-08 株式会社日立製作所 Wireless communication system
WO2016126820A1 (en) * 2015-02-03 2016-08-11 Visa International Service Association Secure multi-channel communication system and method
JP6581437B2 (en) * 2015-08-25 2019-09-25 株式会社日立製作所 Wireless communication system
JP6811377B2 (en) * 2015-09-30 2021-01-13 パナソニックIpマネジメント株式会社 Communication system, transmitter, and receiver as well as communication method, transmission method, and reception method
FR3046315B1 (en) * 2015-12-29 2018-04-27 Thales METHOD FOR UNIVALENT AND UNIVERSAL EXTRACTION OF KEYS FROM THE PROPAGATION CHANNEL
CN107342793B (en) * 2016-04-28 2021-06-29 松下知识产权经营株式会社 Power transmitting device, power receiving device, and power transmission system
US10014026B1 (en) 2017-06-20 2018-07-03 Seagate Technology Llc Head delay calibration and tracking in MSMR systems
CN107483155B (en) * 2017-08-21 2020-05-29 中国电子科技集团公司第五十四研究所 Decoding auxiliary demodulation method for variable-length burst signal
US10297281B1 (en) 2017-11-06 2019-05-21 Seagate Technology Llc Servo sector detection
US10868609B1 (en) * 2018-05-30 2020-12-15 Eagle Technology, Llc Diversity polarization modulation
US10522177B1 (en) 2018-07-31 2019-12-31 Seagate Technology Llc Disc locked clock-based servo timing
US11016681B1 (en) 2018-07-31 2021-05-25 Seagate Technology Llc Multi-threshold parameter adaptation
US11018842B1 (en) 2018-07-31 2021-05-25 Seagate Technology Llc Dynamic timing recovery bandwidth modulation for phase offset mitigation
US10803902B1 (en) 2018-08-19 2020-10-13 Seagate Technology Llc Hardware-based read sample averaging
US10460762B1 (en) 2018-09-04 2019-10-29 Seagate Technology Llc Cancelling adjacent track interference signal with different data rate
US10468060B1 (en) 2018-09-27 2019-11-05 Seagate Technology Llc Cancelling adjacent track interference

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4893339A (en) * 1986-09-03 1990-01-09 Motorola, Inc. Secure communication system
US4956864A (en) * 1987-01-27 1990-09-11 Brockman Milton H Receiver for communications satellite down-link reception
US4890339A (en) * 1988-07-20 1990-01-02 Clark William C Splash suppressor
JPH0443733A (en) * 1990-06-09 1992-02-13 Iwatsu Electric Co Ltd Time division communication privacy call method and system for mobile communication
JP2604093B2 (en) * 1992-10-06 1997-04-23 株式会社小電力高速通信研究所 Array antenna directivity adaptive transceiver
SE502168C2 (en) * 1993-12-29 1995-09-04 Ericsson Telefon Ab L M Method and apparatus of a radio communication system
GB9418749D0 (en) * 1994-09-16 1994-11-02 Ionica L3 Limited Digital telephony
JP3374666B2 (en) * 1996-08-06 2003-02-10 三菱電機株式会社 Communication synchronization method between mobile stations and communication synchronization system between mobile stations
JP2800797B2 (en) * 1996-08-12 1998-09-21 日本電気株式会社 Spread spectrum communication system
JP3204111B2 (en) * 1996-08-28 2001-09-04 松下電器産業株式会社 Directivity control antenna device
JP2949216B2 (en) * 1996-10-31 1999-09-13 電気通信大学長 Modulation transmission / reception method by polarization plane rotation
JP2919414B2 (en) * 1997-01-14 1999-07-12 株式会社ワイ・アール・ピー移動通信基盤技術研究所 Multi-path characteristics measurement method and receiver
US6839378B1 (en) * 1998-01-12 2005-01-04 Ericsson, Inc. Method and apparatus for multipath delay estimation in direct sequence spread spectrum communication systems
JP2000004215A (en) * 1998-06-16 2000-01-07 Matsushita Electric Ind Co Ltd Transmission/reception system

Also Published As

Publication number Publication date
US20020181439A1 (en) 2002-12-05
EP1233547A4 (en) 2006-10-04
WO2002019569A9 (en) 2002-05-16
WO2002019569A1 (en) 2002-03-07
EP1233547A1 (en) 2002-08-21
CN1913395A (en) 2007-02-14
CN1394399A (en) 2003-01-29

Similar Documents

Publication Publication Date Title
CN1276595C (en) Data transmitting apparatus, radio communication system and radio communication method
CN1643842A (en) Communication apparatus and communication system
CN1297088C (en) Receiver
CN1315281C (en) Security devices and processes for protecting and identifying messages
CN1124545C (en) High-speed cryptographic processing apparatus, cryptographic processing method, and storage medium
CN1669257A (en) Communicating method, transmitting device using the same, and receiving device using the same
CN1501653A (en) Receiving apparatus, transmitting apparatus, and reception method
CN1288862C (en) OFDM communication apparatus and OFDM communication method
CN1572080A (en) OFDM communication method and OFDM communication device
CN1157020C (en) Cipher processing units capable of rasing safety
CN101053177A (en) Mobile station device, and method of selecting communication partner
CN1531241A (en) Code reconfigurating method, diffusion code reconfigurating device and system
CN1947372A (en) Personal information management device, distributed key storage device, and personal information management system
CN1643922A (en) Content playback apparatus, method, and program, and key management apparatus and system
CN1668471A (en) Printer and print system, data receiving device and data sending/receiving system
CN1672344A (en) Transmitting apparatus, receiving apparatus, radio communication method, and radio communication system
CN1568592A (en) Transmission device, reception device and radio communication method
CN1380778A (en) OFDM signal transmission system, OFDM signal transmitter and receiver
CN101031143A (en) Method and system for mobile communications
CN1855805A (en) Encryption method for sip message and encrypted sip communication system
CN1842988A (en) Wireless transmission system and wireless transmission method and wireless station and transmitting station for use therein
CN1613050A (en) Printer, server and print system, and data receiving device and data sending/receiving system
CN1930813A (en) Receiver apparatus, receiving method, and wireless communication system
CN1267816C (en) Information security device, prime genrating device and prime genrating method
CN1215531A (en) Method and system for providing acknowledement in a 2-way messaging system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20060920

Termination date: 20130830